fffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:21 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, 0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:21 executing program 5: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:21 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:21 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:21 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:21 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:22 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 271.767423][T13196] loop4: detected capacity change from 0 to 16 23:02:24 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:24 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:24 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:24 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:02:24 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:24 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:24 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:25 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:25 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:25 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:25 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:25 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) [ 274.996227][T13294] loop4: detected capacity change from 0 to 16 23:02:25 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:25 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:25 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:26 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x0, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x0, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:28 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:02:28 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:28 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x0, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:28 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 277.888214][T13392] loop4: detected capacity change from 0 to 16 23:02:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x0, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:28 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:28 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:28 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x0, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:28 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:02:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x0, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:28 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:28 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:28 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x0, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, 0x0, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:31 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:02:31 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:02:31 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, 0x0, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:31 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x0, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 280.826481][T13500] ptrace attach of "/root/syz-executor.3 exec"[13499] was attempted by "/root/syz-executor.3 exec"[13500] 23:02:31 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x0, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, 0x0, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:31 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 281.040062][T13515] loop4: detected capacity change from 0 to 16 [ 281.127605][T13526] ptrace attach of "/root/syz-executor.3 exec"[13521] was attempted by "/root/syz-executor.3 exec"[13526] 23:02:31 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 281.405403][T13550] ptrace attach of "/root/syz-executor.3 exec"[13549] was attempted by "/root/syz-executor.3 exec"[13550] 23:02:31 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:31 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0), 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) [ 282.629894][ T8512] Bluetooth: hci3: command 0x0406 tx timeout 23:02:34 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:02:34 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:02:34 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:34 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:34 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0), 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:34 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0), 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:34 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 284.142743][T13616] loop4: detected capacity change from 0 to 16 23:02:34 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:02:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:34 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:37 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 23:02:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:37 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:37 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:02:37 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:37 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:37 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 287.148871][T13719] loop4: detected capacity change from 0 to 16 23:02:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:37 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:02:37 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:37 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:02:40 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 23:02:40 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:40 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:02:40 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:40 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:40 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:40 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:40 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) [ 290.252071][T13867] loop4: detected capacity change from 0 to 16 [ 290.401334][T13900] ptrace attach of "/root/syz-executor.3 exec"[13897] was attempted by "/root/syz-executor.3 exec"[13900] 23:02:40 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:40 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 290.609910][T13921] ptrace attach of "/root/syz-executor.3 exec"[13920] was attempted by "/root/syz-executor.3 exec"[13921] [ 292.879973][ T2968] Bluetooth: hci5: command 0x0406 tx timeout 23:02:43 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 23:02:43 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:43 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:43 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:02:43 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:43 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) [ 293.240275][T13961] ptrace attach of "/root/syz-executor.3 exec"[13956] was attempted by "/root/syz-executor.3 exec"[13961] 23:02:43 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 293.405038][T13969] loop4: detected capacity change from 0 to 16 23:02:43 executing program 3: r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:43 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:43 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 293.478254][T13982] ptrace attach of "/root/syz-executor.5 exec"[13978] was attempted by "/root/syz-executor.5 exec"[13982] 23:02:43 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:02:44 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 293.742950][T14007] ptrace attach of "/root/syz-executor.5 exec"[14004] was attempted by "/root/syz-executor.5 exec"[14007] 23:02:46 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:02:46 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:46 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 23:02:46 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:46 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:46 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:46 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:46 executing program 3: r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:46 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:46 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:46 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:47 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 297.989861][ T8513] Bluetooth: hci0: command 0x0406 tx timeout 23:02:49 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:49 executing program 1: r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:49 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:02:49 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:49 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 299.387711][T14135] loop1: detected capacity change from 0 to 16 23:02:49 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:49 executing program 1: r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:50 executing program 3: r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:50 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:50 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 299.694008][T14157] loop1: detected capacity change from 0 to 16 23:02:50 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:50 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:50 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:50 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:55 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:02:55 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:55 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:55 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:55 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:55 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:56 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}, 0x0) io_uring_enter(0xffffffffffffffff, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:56 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:56 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}, 0x0) io_uring_enter(0xffffffffffffffff, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:56 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:57 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:02:57 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:57 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}, 0x0) io_uring_enter(0xffffffffffffffff, 0x450c, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:57 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 306.903338][T14330] loop4: detected capacity change from 0 to 16 23:02:59 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:02:59 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:02:59 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:59 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:59 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:02:59 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:02:59 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:02:59 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:03:00 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:00 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:00 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) io_uring_enter(0xffffffffffffffff, 0x6cab, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:03:00 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 309.964476][T14424] loop4: detected capacity change from 0 to 16 23:03:02 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:02 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) io_uring_enter(0xffffffffffffffff, 0x0, 0xadb0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:03:02 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:02 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:02 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:03:02 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:03:02 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:03:02 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:03 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:03 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:03:03 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:03:03 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 313.055537][T14504] loop4: detected capacity change from 0 to 16 23:03:05 executing program 3: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:05 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:03:05 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:05 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:03:05 executing program 3: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:05 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:05 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:03:05 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:03:06 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:06 executing program 3: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:06 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:06 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:03:06 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x2, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) 23:03:06 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:03:06 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:06 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 316.145740][T14589] loop4: detected capacity change from 0 to 16 23:03:06 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 316.318226][T14599] loop1: detected capacity change from 0 to 16 23:03:06 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 316.392394][ T1358] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.404192][ T1358] ieee802154 phy1 wpan1: encryption failed: -22 23:03:06 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) io_uring_enter(0xffffffffffffffff, 0x0, 0xadb0, 0x0, &(0x7f00000002c0)={[0xfffffffffffffff9]}, 0x8) [ 316.528181][T14608] loop5: detected capacity change from 0 to 16 23:03:07 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:12 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:12 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:12 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) io_uring_enter(0xffffffffffffffff, 0x0, 0xadb0, 0x0, 0x0, 0x0) 23:03:12 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:12 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:12 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:12 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:13 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) io_uring_enter(0xffffffffffffffff, 0x0, 0xadb0, 0x0, 0x0, 0x0) [ 322.638371][T14708] loop4: detected capacity change from 0 to 16 [ 322.715775][T14710] loop1: detected capacity change from 0 to 16 23:03:18 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:18 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) io_uring_enter(0xffffffffffffffff, 0x0, 0xadb0, 0x0, 0x0, 0x0) 23:03:18 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:18 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:18 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:18 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 327.743442][T14767] loop4: detected capacity change from 0 to 16 23:03:18 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 327.795883][T14773] loop1: detected capacity change from 0 to 16 [ 327.965828][T14803] loop5: detected capacity change from 0 to 16 23:03:18 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:18 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) io_uring_enter(0xffffffffffffffff, 0x0, 0xadb0, 0x0, &(0x7f00000002c0), 0x8) 23:03:18 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:18 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:19 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) io_uring_enter(0xffffffffffffffff, 0x0, 0xadb0, 0x0, &(0x7f00000002c0), 0x8) 23:03:21 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:21 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x287, &(0x7f0000000080)={0x0, 0x1df4, 0x8}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) r3 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) io_uring_enter(0xffffffffffffffff, 0x0, 0xadb0, 0x0, &(0x7f00000002c0), 0x8) [ 331.164444][T14880] loop5: detected capacity change from 0 to 16 23:03:27 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:27 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:27 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:27 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:27 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:27 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 23:03:27 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:27 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:28 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:28 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 337.620479][T14930] loop5: detected capacity change from 0 to 16 [ 337.706253][T14935] loop4: detected capacity change from 0 to 16 23:03:28 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:28 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:28 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:28 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 338.071619][T14954] loop4: detected capacity change from 0 to 16 23:03:30 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:30 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:30 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:30 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:30 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:30 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) [ 340.564410][T15011] loop2: detected capacity change from 0 to 16 23:03:31 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 340.608164][T15018] loop5: detected capacity change from 0 to 16 [ 340.626684][T15023] loop4: detected capacity change from 0 to 16 23:03:31 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:31 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:31 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:31 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:31 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:31 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:31 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:33 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:33 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 343.780126][T15149] loop4: detected capacity change from 0 to 16 23:03:39 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:39 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:39 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:03:39 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:39 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:39 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:39 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:39 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 349.267529][T15190] loop4: detected capacity change from 0 to 16 [ 349.294164][T15196] loop2: detected capacity change from 0 to 16 23:03:39 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:40 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:40 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:40 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:40 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:40 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:42 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:03:42 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:42 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:42 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:42 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:42 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:42 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:42 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 352.320821][T15305] loop4: detected capacity change from 0 to 16 [ 352.331845][T15307] ptrace attach of "/root/syz-executor.3 exec"[15304] was attempted by "/root/syz-executor.3 exec"[15307] 23:03:42 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:42 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:42 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 352.612583][T15351] ptrace attach of "/root/syz-executor.3 exec"[15348] was attempted by "/root/syz-executor.3 exec"[15351] [ 352.626594][T15354] loop2: detected capacity change from 0 to 16 23:03:43 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 352.784547][T15371] ptrace attach of "/root/syz-executor.3 exec"[15370] was attempted by "/root/syz-executor.3 exec"[15371] 23:03:49 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:03:49 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:49 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:49 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:49 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:49 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 359.488165][T15411] loop4: detected capacity change from 0 to 16 [ 359.500922][T15410] loop2: detected capacity change from 0 to 16 23:03:49 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:49 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:50 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:50 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:50 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:50 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:54 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:03:54 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:54 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:54 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x0) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:54 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 364.599658][T15521] loop2: detected capacity change from 0 to 16 23:03:57 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:03:57 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:57 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:57 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:03:57 executing program 1: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:03:57 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 367.307661][T15580] loop2: detected capacity change from 0 to 16 [ 367.324413][T15586] loop4: detected capacity change from 0 to 16 23:03:57 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x0) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:04:07 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:07 executing program 1: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:07 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:04:07 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:07 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:07 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x0) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:04:07 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:04:07 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:07 executing program 1: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:08 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 377.581976][T15674] loop4: detected capacity change from 0 to 16 23:04:08 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:04:08 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 377.862965][ T1358] ieee802154 phy0 wpan0: encryption failed: -22 [ 377.869308][ T1358] ieee802154 phy1 wpan1: encryption failed: -22 23:04:08 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:08 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:04:08 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:13 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:13 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 383.263201][T15793] ptrace attach of "/root/syz-executor.2 exec"[15792] was attempted by "/root/syz-executor.2 exec"[15793] [ 383.288368][T15792] loop2: detected capacity change from 0 to 16 [ 383.451332][T15804] loop4: detected capacity change from 0 to 16 23:04:20 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:04:20 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:20 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:20 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:04:20 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:04:20 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:20 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 390.024004][T15840] loop2: detected capacity change from 0 to 16 23:04:20 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:20 executing program 1: syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 390.081934][T15852] loop4: detected capacity change from 0 to 16 23:04:20 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:20 executing program 1: syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:20 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:20 executing program 1: syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:20 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:20 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, 0x0) 23:04:22 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:04:23 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 393.102606][T15974] loop4: detected capacity change from 0 to 16 23:04:23 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:04:23 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:23 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:23 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, 0x0) 23:04:23 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:04:23 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, 0x0) 23:04:23 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x0, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 393.483497][T15996] loop2: detected capacity change from 0 to 16 23:04:23 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x0, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:24 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:24 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x0, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:24 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:33 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:33 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x0, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:33 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:33 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:04:33 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:04:33 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:33 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:04:33 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x0, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:33 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x0, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 402.930687][T16128] loop2: detected capacity change from 0 to 16 [ 403.001858][T16134] loop4: detected capacity change from 0 to 16 23:04:33 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x0, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:33 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x0, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:33 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:33 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x0, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:33 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x0, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:34 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x0, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 403.658349][T16209] loop4: detected capacity change from 0 to 16 23:04:34 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x0, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:36 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:04:39 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:39 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:39 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x0, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:39 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:39 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:04:39 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 409.511860][T16308] ptrace attach of "/root/syz-executor.4 exec"[16306] was attempted by "/root/syz-executor.4 exec"[16308] 23:04:39 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x0, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 409.556481][T16311] loop1: detected capacity change from 0 to 16 [ 409.574623][T16315] loop4: detected capacity change from 0 to 16 23:04:40 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x0, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 409.671473][T16329] loop2: detected capacity change from 0 to 16 23:04:40 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:04:40 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:40 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x0, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:40 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x0, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 410.099360][T16443] loop1: detected capacity change from 0 to 16 23:04:40 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x0, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:40 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:04:40 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x0, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 410.363443][T16486] ptrace attach of "/root/syz-executor.5 exec"[16485] was attempted by "/root/syz-executor.5 exec"[16486] 23:04:46 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:46 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x0, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:46 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:46 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:04:46 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:04:46 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 416.000677][T16531] ptrace attach of "/root/syz-executor.2 exec"[16529] was attempted by "/root/syz-executor.2 exec"[16531] [ 416.028824][T16536] ptrace attach of "/root/syz-executor.5 exec"[16533] was attempted by "/root/syz-executor.5 exec"[16536] [ 416.071765][T16538] loop2: detected capacity change from 0 to 16 [ 416.084706][T16537] loop1: detected capacity change from 0 to 16 23:04:46 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x0, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 416.135869][T16546] ptrace attach of "/root/syz-executor.4 exec"[16542] was attempted by "/root/syz-executor.4 exec"[16546] [ 416.227940][T16555] loop4: detected capacity change from 0 to 16 23:04:46 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:04:46 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:46 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 416.521985][T16591] loop2: detected capacity change from 0 to 16 23:04:47 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:47 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) [ 417.135453][T16656] loop1: detected capacity change from 0 to 16 23:04:55 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:04:55 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:55 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) 23:04:55 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:04:55 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:04:55 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 425.442980][T16724] ptrace attach of "/root/syz-executor.5 exec"[16719] was attempted by "/root/syz-executor.5 exec"[16724] 23:04:55 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 425.562235][T16752] ptrace attach of "/root/syz-executor.4 exec"[16745] was attempted by "/root/syz-executor.4 exec"[16752] [ 425.622644][T16761] loop4: detected capacity change from 0 to 16 23:04:56 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:56 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:56 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:04:56 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:04:56 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:02 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:05:02 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:02 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) 23:05:02 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:02 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:02 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:02 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:03 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 432.778857][T16939] loop4: detected capacity change from 0 to 16 23:05:03 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:03 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:03 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:03 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:03 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:05:03 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:03 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:04 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 433.753028][T17048] loop4: detected capacity change from 0 to 16 23:05:05 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:05:05 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:06 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:06 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:06 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:05:06 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:06 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) [ 435.874010][T17106] ptrace attach of "/root/syz-executor.5 exec"[17104] was attempted by "/root/syz-executor.5 exec"[17106] 23:05:06 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:07 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:05:07 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:07 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:07 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 436.725266][T17191] ptrace attach of "/root/syz-executor.5 exec"[17189] was attempted by "/root/syz-executor.5 exec"[17191] [ 436.919618][T17232] loop4: detected capacity change from 0 to 16 [ 439.290857][ T1358] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.305414][ T1358] ieee802154 phy1 wpan1: encryption failed: -22 23:05:16 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:05:16 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:16 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:16 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:05:16 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:16 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 446.159514][T17300] ptrace attach of "/root/syz-executor.5 exec"[17296] was attempted by "/root/syz-executor.5 exec"[17300] [ 446.165475][T17297] ptrace attach of "/root/syz-executor.4 exec"[17294] was attempted by "/root/syz-executor.4 exec"[17297] 23:05:16 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, 0x0) [ 446.233403][T17306] loop4: detected capacity change from 0 to 16 23:05:16 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, 0x0) 23:05:17 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:17 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, 0x0) 23:05:17 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:17 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:22 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:05:22 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:22 executing program 1: clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:26 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:05:26 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:26 executing program 5: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:26 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x22, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:26 executing program 1: clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:26 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:26 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 456.678862][T17563] ptrace attach of "/root/syz-executor.4 exec"[17559] was attempted by "/root/syz-executor.4 exec"[17563] 23:05:27 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x0, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:27 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:27 executing program 1: clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) [ 456.757906][T17586] loop4: detected capacity change from 0 to 16 23:05:27 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:27 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x0, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:35 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:35 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@loopback={0x0, 0x300}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x601c0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x6, 0x3f, 0x0, 0x0, 0x100000000, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x80, 0x83c9, 0x1, 0x5, 0x2, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0x2) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000001780)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x0, 0x0, 0x1a00, 0x8, 0x0, 0x0, 0x4}) 23:05:35 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:35 executing program 5: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:35 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:05:35 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 465.611012][T17726] loop4: detected capacity change from 0 to 16 23:05:36 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:36 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:36 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:36 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:36 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:37 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:37 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:37 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:37 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:38 executing program 5: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:38 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:38 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:05:39 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:39 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:39 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:05:39 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) [ 469.058861][T18122] loop4: detected capacity change from 0 to 16 23:05:39 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:39 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 23:05:40 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 23:05:40 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 23:05:40 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 23:05:42 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:42 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:43 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:05:43 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:43 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:43 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:05:43 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:43 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:43 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 472.966334][T18289] loop4: detected capacity change from 0 to 16 23:05:43 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 473.247303][T18317] loop1: detected capacity change from 0 to 16 23:05:43 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:43 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 473.547794][T18377] loop1: detected capacity change from 0 to 16 23:05:45 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:45 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:46 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:46 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:46 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:05:46 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:05:46 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:46 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:46 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:46 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 476.050873][T18438] loop1: detected capacity change from 0 to 16 [ 476.109508][T18461] loop4: detected capacity change from 0 to 16 23:05:46 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:46 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 476.534157][T18498] loop1: detected capacity change from 0 to 16 23:05:48 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:48 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 477.962749][T18524] loop1: detected capacity change from 0 to 16 23:05:49 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:49 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:05:49 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:05:49 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:05:49 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 479.261840][T18637] loop4: detected capacity change from 0 to 16 23:05:49 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:50 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:50 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 479.982098][T18719] ptrace attach of "/root/syz-executor.2 exec"[18718] was attempted by "/root/syz-executor.2 exec"[18719] 23:05:50 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 480.205956][T18744] ptrace attach of "/root/syz-executor.2 exec"[18743] was attempted by "/root/syz-executor.2 exec"[18744] 23:05:50 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 480.480511][T18770] ptrace attach of "/root/syz-executor.2 exec"[18769] was attempted by "/root/syz-executor.2 exec"[18770] [ 480.623179][ T1102] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 480.678501][ T1102] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 480.739644][ T1102] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 23:05:51 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:51 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 480.852343][ T1102] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 23:05:51 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:52 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:52 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 482.423109][T18955] loop4: detected capacity change from 0 to 16 [ 483.334168][ T1102] device hsr_slave_0 left promiscuous mode [ 483.352103][ T1102] device hsr_slave_1 left promiscuous mode [ 483.358711][ T1102] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 483.375501][ T1102] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 483.388092][ T1102] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 483.403776][ T1102] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 483.417072][ T1102] device bridge_slave_1 left promiscuous mode [ 483.428516][ T1102] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.449395][ T1102] device bridge_slave_0 left promiscuous mode [ 483.458717][ T1102] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.486652][ T1102] device veth1_macvtap left promiscuous mode [ 483.493595][ T1102] device veth0_macvtap left promiscuous mode [ 483.501072][ T1102] device veth1_vlan left promiscuous mode [ 483.507000][ T1102] device veth0_vlan left promiscuous mode [ 483.839043][ T1102] team0 (unregistering): Port device team_slave_1 removed [ 483.866618][ T1102] team0 (unregistering): Port device team_slave_0 removed [ 483.883422][ T1102] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 483.903857][ T1102] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 484.095994][ T1102] bond0 (unregistering): Released all slaves 23:05:54 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:54 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) 23:05:54 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:54 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:55 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:55 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:55 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:55 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:55 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:05:55 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 485.464500][T19071] loop4: detected capacity change from 0 to 16 23:05:56 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:56 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:56 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:57 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:57 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:05:57 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:05:57 executing program 1: clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:58 executing program 1: clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:05:58 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:05:58 executing program 1: clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) [ 488.497219][T19354] ptrace attach of "/root/syz-executor.2 exec"[19353] was attempted by "/root/syz-executor.2 exec"[19354] 23:05:59 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:05:59 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:05:59 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) [ 489.348671][T19430] loop4: detected capacity change from 0 to 16 23:05:59 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:06:00 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:06:00 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:06:00 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:01 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:01 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:06:01 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:03 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:06:03 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:06:03 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 493.197802][T19641] loop4: detected capacity change from 0 to 16 [ 493.223632][T19646] ptrace attach of "/root/syz-executor.2 exec"[19644] was attempted by "/root/syz-executor.2 exec"[19646] 23:06:04 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:06:04 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:06:04 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:04 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:05 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:06:05 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:05 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:06:05 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:06:05 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:06:07 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:06:07 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) 23:06:07 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 496.841108][T19911] ptrace attach of "/root/syz-executor.2 exec"[19907] was attempted by "/root/syz-executor.2 exec"[19911] [ 496.858162][T19913] loop4: detected capacity change from 0 to 16 23:06:07 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 23:06:07 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 23:06:07 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:07 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:07 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 23:06:08 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:08 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 23:06:08 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:08 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 498.246876][T20057] loop1: detected capacity change from 0 to 16 23:06:10 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:10 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:10 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:10 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 500.233089][T20097] loop1: detected capacity change from 0 to 16 [ 500.240879][T20106] loop4: detected capacity change from 0 to 16 23:06:10 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:10 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:06:10 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 500.678494][T20184] ptrace attach of "/root/syz-executor.0 exec"[20182] was attempted by "/root/syz-executor.0 exec"[20184] [ 500.727513][ T1358] ieee802154 phy0 wpan0: encryption failed: -22 [ 500.733898][ T1358] ieee802154 phy1 wpan1: encryption failed: -22 23:06:11 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:13 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:13 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:06:13 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 503.246096][T20243] loop1: detected capacity change from 0 to 16 [ 503.388867][T20256] loop4: detected capacity change from 0 to 16 23:06:14 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:14 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:14 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 504.363920][T20340] ptrace attach of "/root/syz-executor.0 exec"[20339] was attempted by "/root/syz-executor.0 exec"[20340] 23:06:14 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 504.572598][T20365] ptrace attach of "/root/syz-executor.0 exec"[20364] was attempted by "/root/syz-executor.0 exec"[20365] 23:06:15 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:16 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:06:16 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:16 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 506.336577][T20417] ptrace attach of "/root/syz-executor.1 exec"[20416] was attempted by "/root/syz-executor.1 exec"[20417] [ 506.502404][T20442] loop4: detected capacity change from 0 to 16 23:06:17 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:17 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:17 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:18 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 507.922639][T20544] ptrace attach of "/root/syz-executor.0 exec"[20543] was attempted by "/root/syz-executor.0 exec"[20544] 23:06:18 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 508.214036][T20570] ptrace attach of "/root/syz-executor.0 exec"[20569] was attempted by "/root/syz-executor.0 exec"[20570] 23:06:18 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 508.503348][T20596] ptrace attach of "/root/syz-executor.0 exec"[20595] was attempted by "/root/syz-executor.0 exec"[20596] 23:06:19 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:19 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:19 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 509.601961][T20667] loop4: detected capacity change from 0 to 16 23:06:20 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:06:20 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:06:20 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 510.330285][T20707] ptrace attach of "/root/syz-executor.5 exec"[20706] was attempted by "/root/syz-executor.5 exec"[20707] 23:06:20 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 510.380820][T20710] ptrace attach of "/root/syz-executor.1 exec"[20709] was attempted by "/root/syz-executor.1 exec"[20710] 23:06:22 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:22 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 512.762716][T20836] loop4: detected capacity change from 0 to 16 23:06:23 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:24 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:24 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 514.227187][T20874] ptrace attach of "/root/syz-executor.5 exec"[20873] was attempted by "/root/syz-executor.5 exec"[20874] 23:06:24 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 514.448861][T20900] ptrace attach of "/root/syz-executor.5 exec"[20899] was attempted by "/root/syz-executor.5 exec"[20900] 23:06:25 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:25 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 515.377420][T20955] ptrace attach of "/root/syz-executor.1 exec"[20954] was attempted by "/root/syz-executor.1 exec"[20955] 23:06:25 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:25 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:26 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 515.651525][T20981] loop1: detected capacity change from 0 to 16 [ 515.809716][T21006] ptrace attach of "/root/syz-executor.4 exec"[21003] was attempted by "/root/syz-executor.4 exec"[21006] [ 515.876414][T21006] loop4: detected capacity change from 0 to 16 23:06:26 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 516.215710][T21046] ptrace attach of "/root/syz-executor.4 exec"[21045] was attempted by "/root/syz-executor.4 exec"[21046] [ 516.278415][T21046] loop4: detected capacity change from 0 to 16 23:06:27 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:27 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 517.657029][T21080] ptrace attach of "/root/syz-executor.4 exec"[21079] was attempted by "/root/syz-executor.4 exec"[21080] [ 517.721942][T21081] loop4: detected capacity change from 0 to 16 23:06:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:28 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:06:29 executing program 2: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 518.742038][T21139] ptrace attach of "/root/syz-executor.1 exec"[21135] was attempted by "/root/syz-executor.1 exec"[21139] [ 518.783462][T21139] loop1: detected capacity change from 0 to 16 23:06:30 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:30 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:30 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:31 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:31 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:31 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:32 executing program 2: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:33 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:34 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:06:34 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 524.852766][T21351] loop4: detected capacity change from 0 to 16 23:06:39 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:39 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:06:39 executing program 2: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:39 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:39 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:06:39 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 529.235697][T21432] loop4: detected capacity change from 0 to 16 [ 529.253433][T21437] ptrace attach of "/root/syz-executor.1 exec"[21429] was attempted by "/root/syz-executor.1 exec"[21437] [ 529.314179][T21437] loop1: detected capacity change from 0 to 16 23:06:39 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:06:39 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 529.633345][T21507] ptrace attach of "/root/syz-executor.1 exec"[21506] was attempted by "/root/syz-executor.1 exec"[21507] [ 529.711189][T21507] loop1: detected capacity change from 0 to 16 23:06:40 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 529.777112][T21524] loop4: detected capacity change from 0 to 16 23:06:40 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 530.178756][T21604] loop4: detected capacity change from 0 to 16 23:06:42 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:42 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:42 executing program 0: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:42 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:42 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:42 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:43 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:43 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:43 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 533.278951][T21775] loop4: detected capacity change from 0 to 16 23:06:45 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:45 executing program 0: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:45 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:46 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:06:46 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 536.110288][T21866] loop1: detected capacity change from 0 to 16 23:06:46 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:06:46 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 536.389839][T21906] loop4: detected capacity change from 0 to 16 23:06:48 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:48 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:48 executing program 0: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:49 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:06:49 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:49 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 539.147170][T22038] loop5: detected capacity change from 0 to 16 [ 539.147991][T22039] loop1: detected capacity change from 0 to 16 23:06:49 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 539.477505][T22057] loop4: detected capacity change from 0 to 16 23:06:51 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:51 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:51 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:51 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:52 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:52 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 542.228096][T22147] loop1: detected capacity change from 0 to 16 [ 542.233691][T22148] loop5: detected capacity change from 0 to 16 23:06:52 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 542.522483][T22174] loop4: detected capacity change from 0 to 16 23:06:54 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 544.408045][T22195] ptrace attach of "/root/syz-executor.2 exec"[22194] was attempted by "/root/syz-executor.2 exec"[22195] 23:06:54 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:06:54 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:54 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 544.614783][T22222] ptrace attach of "/root/syz-executor.2 exec"[22221] was attempted by "/root/syz-executor.2 exec"[22222] 23:06:55 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 544.936248][T22277] ptrace attach of "/root/syz-executor.2 exec"[22276] was attempted by "/root/syz-executor.2 exec"[22277] 23:06:55 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:55 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:55 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:06:55 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:55 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 545.336284][T22330] loop1: detected capacity change from 0 to 16 23:06:55 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:06:56 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 545.603654][T22377] loop1: detected capacity change from 0 to 16 [ 545.727176][T22392] loop4: detected capacity change from 0 to 16 23:06:56 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:56 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:57 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:58 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:58 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:06:58 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:58 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 548.331751][T22501] loop5: detected capacity change from 0 to 16 23:06:58 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:06:58 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 23:06:58 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:06:58 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 548.592923][T22514] loop1: detected capacity change from 0 to 16 [ 548.748957][T22542] loop4: detected capacity change from 0 to 16 [ 548.803414][T22532] loop5: detected capacity change from 0 to 16 23:07:01 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:01 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:01 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:07:01 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) 23:07:02 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:07:02 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 551.847842][T22625] loop5: detected capacity change from 0 to 16 [ 551.873534][T22629] loop4: detected capacity change from 0 to 16 23:07:03 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:04 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:04 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:07:05 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) 23:07:05 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:07:05 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 554.943609][T22732] loop4: detected capacity change from 0 to 16 [ 555.029429][T22747] loop5: detected capacity change from 0 to 16 23:07:05 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) [ 555.300836][T22766] loop5: detected capacity change from 0 to 16 23:07:07 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:07 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:07:07 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:07:07 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 556.927922][T22804] ptrace attach of "/root/syz-executor.0 exec"[22803] was attempted by "/root/syz-executor.0 exec"[22804] 23:07:07 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:07:07 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:07:07 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:07:07 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:07:08 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:08 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:07:08 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 558.081458][T22876] loop4: detected capacity change from 0 to 16 23:07:08 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) [ 558.408754][T22902] loop5: detected capacity change from 0 to 16 23:07:11 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:07:11 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:07:11 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() 23:07:11 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:07:11 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:07:11 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) [ 560.993518][T22942] ptrace attach of "/root/syz-executor.0 exec"[22940] was attempted by "/root/syz-executor.0 exec"[22942] 23:07:11 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:07:11 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 561.268430][T22978] loop4: detected capacity change from 0 to 16 23:07:11 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:11 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) 23:07:11 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:12 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:12 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 562.152048][ T1358] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.158355][ T1358] ieee802154 phy1 wpan1: encryption failed: -22 23:07:15 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:07:15 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) getpid() [ 565.120488][T23056] ptrace attach of "/root/syz-executor.0 exec"[23055] was attempted by "/root/syz-executor.0 exec"[23056] 23:07:15 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:07:15 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="daa724bba5cda0d7fe3290b6f79b2a4405065a0e50dfab8ab5d25ce60c2a7881938a60e1b80ddc1ea85fb3db31af644e355bb7994a7fc91d8beb17b77615e75b4c727e11462703af0ca077bf0e59ac66c0f07fc8fb33c59a234b6bfb738e54bbc3fabd54abb4d134996df639189d67ebabf598d1a3b9047780178317b221da1ee00f6a09b927d8d17dc4b3c167d3c00f778b3476a330ad6792380bc5ea8814e9d5a7632adfb96a3bcdd878c4a8f002442305cba626f4f80aea942b17b71b3f0cbd6c642da5e56c187802c572422f8d163a77a7f90375", 0xd6, 0x1000}, {&(0x7f0000000300)="29bbb1d4da5dd14eb42bfcc906c328c05179c77790c68fa0f1f7077ec1997fac08bf57c739efc5bb6a3bf89958ec4fc233d4", 0x32, 0x3f}], 0x534efcff19a59a31, &(0x7f0000000380)={[{@dioread_nolock}, {@usrjquota}, {@block_validity}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x422002, 0x0) 23:07:15 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:15 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:07:15 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 565.338714][T23088] loop4: detected capacity change from 0 to 16 [ 565.361379][T23055] ================================================================== [ 565.369790][T23055] BUG: KASAN: null-ptr-deref in dst_release+0x26/0xe0 [ 565.376602][T23055] Write of size 4 at addr 0000000000000041 by task syz-executor.0/23055 [ 565.384939][T23055] [ 565.387264][T23055] CPU: 0 PID: 23055 Comm: syz-executor.0 Not tainted 5.15.0-rc6-syzkaller #0 [ 565.396037][T23055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.406104][T23055] Call Trace: [ 565.409390][T23055] dump_stack_lvl+0xcd/0x134 [ 565.413999][T23055] kasan_report.cold+0x66/0xdf [ 565.418783][T23055] ? dst_release+0x26/0xe0 [ 565.423224][T23055] kasan_check_range+0x13d/0x180 [ 565.428191][T23055] dst_release+0x26/0xe0 [ 565.432459][T23055] dst_cache_destroy+0xcb/0x190 [ 565.437343][T23055] sit_init_net+0x7d8/0xaa0 [ 565.441864][T23055] ? ipip6_tunnel_ctl+0x1040/0x1040 [ 565.447089][T23055] ops_init+0xaf/0x470 [ 565.451183][T23055] setup_net+0x40f/0xa30 [ 565.455435][T23055] ? down_read_killable+0x1a9/0x480 [ 565.460648][T23055] ? ops_init+0x470/0x470 [ 565.464984][T23055] ? rcu_read_lock_sched_held+0x3a/0x70 [ 565.470537][T23055] copy_net_ns+0x319/0x760 [ 565.474958][T23055] create_new_namespaces+0x3f6/0xb20 [ 565.480246][T23055] copy_namespaces+0x391/0x450 [ 565.485006][T23055] copy_process+0x2da7/0x7590 [ 565.489676][T23055] ? mark_lock+0xef/0x17b0 [ 565.494089][T23055] ? futex_wait_restart+0x200/0x200 [ 565.499306][T23055] ? __cleanup_sighand+0xb0/0xb0 [ 565.504252][T23055] ? __lock_acquire+0x162f/0x54a0 [ 565.509274][T23055] ? kernel_clone+0xc4/0xac0 [ 565.513864][T23055] kernel_clone+0xe7/0xac0 [ 565.518285][T23055] ? create_io_thread+0xf0/0xf0 [ 565.523128][T23055] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 565.529106][T23055] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 565.535097][T23055] ? find_held_lock+0x2d/0x110 [ 565.539863][T23055] __do_sys_clone+0xc8/0x110 [ 565.544450][T23055] ? kernel_clone+0xac0/0xac0 [ 565.549126][T23055] ? lock_downgrade+0x6e0/0x6e0 [ 565.553990][T23055] ? syscall_enter_from_user_mode+0x21/0x70 [ 565.559888][T23055] do_syscall_64+0x35/0xb0 [ 565.564295][T23055] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 565.570184][T23055] RIP: 0033:0x7f2ffa36ba39 [ 565.574596][T23055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 565.594389][T23055] RSP: 002b:00007f2ff78e1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 565.602794][T23055] RAX: ffffffffffffffda RBX: 00007f2ffa46ef60 RCX: 00007f2ffa36ba39 [ 565.610754][T23055] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006cb2e100 [ 565.618714][T23055] RBP: 00007f2ffa3c5e8f R08: 0000000000000000 R09: 0000000000000000 [ 565.626673][T23055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 23:07:16 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:07:16 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a40f00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd0, 0x8000}}], 0x1, 0x0) [ 565.634653][T23055] R13: 00007ffe8d6bd24f R14: 00007f2ff78e1300 R15: 0000000000022000 [ 565.642642][T23055] ================================================================== [ 565.650683][T23055] Disabling lock debugging due to kernel taint [ 565.767478][T23055] Kernel panic - not syncing: panic_on_warn set ... [ 565.774104][T23055] CPU: 0 PID: 23055 Comm: syz-executor.0 Tainted: G B 5.15.0-rc6-syzkaller #0 [ 565.784261][T23055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.794399][T23055] Call Trace: [ 565.797675][T23055] dump_stack_lvl+0xcd/0x134 [ 565.802279][T23055] panic+0x2b0/0x6dd [ 565.806177][T23055] ? __warn_printk+0xf3/0xf3 [ 565.810773][T23055] ? preempt_schedule_common+0x59/0xc0 23:07:16 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = gettid() clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 565.816240][T23055] ? dst_release+0x26/0xe0 [ 565.820669][T23055] ? preempt_schedule_thunk+0x16/0x18 [ 565.826053][T23055] ? trace_hardirqs_on+0x38/0x1c0 [ 565.831087][T23055] ? trace_hardirqs_on+0x51/0x1c0 [ 565.836121][T23055] ? dst_release+0x26/0xe0 [ 565.840548][T23055] ? dst_release+0x26/0xe0 [ 565.844981][T23055] end_report.cold+0x63/0x6f [ 565.849582][T23055] kasan_report.cold+0x71/0xdf [ 565.854354][T23055] ? dst_release+0x26/0xe0 [ 565.858785][T23055] kasan_check_range+0x13d/0x180 [ 565.863730][T23055] dst_release+0x26/0xe0 [ 565.867980][T23055] dst_cache_destroy+0xcb/0x190 [ 565.872846][T23055] sit_init_net+0x7d8/0xaa0 [ 565.877354][T23055] ? ipip6_tunnel_ctl+0x1040/0x1040 [ 565.882561][T23055] ops_init+0xaf/0x470 [ 565.886638][T23055] setup_net+0x40f/0xa30 [ 565.890882][T23055] ? down_read_killable+0x1a9/0x480 [ 565.896088][T23055] ? ops_init+0x470/0x470 [ 565.900459][T23055] ? rcu_read_lock_sched_held+0x3a/0x70 [ 565.906027][T23055] copy_net_ns+0x319/0x760 [ 565.910477][T23055] create_new_namespaces+0x3f6/0xb20 [ 565.915800][T23055] copy_namespaces+0x391/0x450 [ 565.920598][T23055] copy_process+0x2da7/0x7590 [ 565.925301][T23055] ? mark_lock+0xef/0x17b0 [ 565.929738][T23055] ? futex_wait_restart+0x200/0x200 [ 565.934968][T23055] ? __cleanup_sighand+0xb0/0xb0 [ 565.939928][T23055] ? __lock_acquire+0x162f/0x54a0 [ 565.944965][T23055] ? kernel_clone+0xc4/0xac0 [ 565.949559][T23055] kernel_clone+0xe7/0xac0 [ 565.953992][T23055] ? create_io_thread+0xf0/0xf0 [ 565.958853][T23055] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 565.964855][T23055] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 565.970868][T23055] ? find_held_lock+0x2d/0x110 [ 565.975650][T23055] __do_sys_clone+0xc8/0x110 [ 565.980256][T23055] ? kernel_clone+0xac0/0xac0 [ 565.984945][T23055] ? lock_downgrade+0x6e0/0x6e0 [ 565.989820][T23055] ? syscall_enter_from_user_mode+0x21/0x70 [ 565.995735][T23055] do_syscall_64+0x35/0xb0 [ 566.000161][T23055] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 566.006069][T23055] RIP: 0033:0x7f2ffa36ba39 [ 566.010489][T23055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 566.030113][T23055] RSP: 002b:00007f2ff78e1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 566.038534][T23055] RAX: ffffffffffffffda RBX: 00007f2ffa46ef60 RCX: 00007f2ffa36ba39 [ 566.046506][T23055] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006cb2e100 [ 566.054478][T23055] RBP: 00007f2ffa3c5e8f R08: 0000000000000000 R09: 0000000000000000 [ 566.062455][T23055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 566.070433][T23055] R13: 00007ffe8d6bd24f R14: 00007f2ff78e1300 R15: 0000000000022000 [ 566.079557][T23055] Kernel Offset: disabled [ 566.083869][T23055] Rebooting in 86400 seconds..