(0x7f0000001d80)='net/psched\x00') r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r2, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="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", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) 09:23:14 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x10100, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) pipe2(&(0x7f0000000140), 0x84000) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x28001, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x100, 0x0) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, r0, 0x2, r0, 0x2) 09:23:14 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:23:14 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x0, 0x0, 0x8, 0xaa, 0x3, 0x3, 0x5, 0x29, 0x40, 0x28b, 0x81, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:23:14 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:23:14 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r5], 0x8, 0x0, 0x1}, 0x7fff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r6, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:23:14 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f0000000140)={0x3, 0x100, 0x101}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x100010, r2, 0x8000000) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r2, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0x200000, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x1ff, 0x10001, 0x80000001, 0x0, 0xe08, 0x54a}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r2) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:23:14 executing program 3: ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x3b0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xb2d, 0x8a}}, './file0\x00'}) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x10, 0x1f, 0x4, 0x39, 0x8, 0x2, 0x5, 0x80000000, 0x39a, 0x40, 0x1c8, 0x10000, 0x0, 0x38, 0x2, 0xfffe, 0x7f}, [{0x4, 0x3, 0xcf, 0x6, 0x6, 0x3, 0x1, 0x1}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1978) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001a00)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x9, &(0x7f00000019c0)=[r0], 0x1, 0x0, 0x1}, 0x1f) r1 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r2, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="da7e59a79ae14df059cdaff071336b717226b26f239d85db2c502b743e8431a7b1bce54f955b13f17fbcdc263dd8bd509b0c52706cc15430708317bc01a00d7e53986c49e04e7b8af6d4d8d4615b29a35cc69c51039ba1065a05da7b33b9a20d59ec6261618668bfbf93c976c5a8d780b3bc8f1d31bd7f00a127c35b04fe4ede4d0b5b077c88a670ae509c10fd6cc301a3c4424356b8cae951c8a14509eaebdad9dd7c43d773619706eebe7fad5153ac543e18902ea00af9cdd1cb2858f68be35e822af827d937d485f47893b04d967c55d54720917df290374f874d6dc79ada3d5c0b953f11e07b572208ac299e204d231ef48a7554009560f8e50f", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) [ 411.802847] loop5: detected capacity change from 0 to 264192 [ 411.816100] tmpfs: Bad value for 'nr_inodes' 09:23:14 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x0, 0x0, 0x8, 0xaa, 0x3, 0x3, 0x5, 0x29, 0x40, 0x28b, 0x81, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:23:14 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x10100, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) pipe2(&(0x7f0000000140), 0x84000) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x28001, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x100, 0x0) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, r0, 0x2, r0, 0x2) 09:23:14 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) 09:23:28 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r5], 0x8, 0x0, 0x1}, 0x7fff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r6, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:23:28 executing program 3: ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x3b0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xb2d, 0x8a}}, './file0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001a00)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x9, &(0x7f00000019c0)=[r0], 0x1, 0x0, 0x1}, 0x1f) r1 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r2, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="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", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) 09:23:28 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x2011, r3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq={'uid', 0x3d, r8}}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq={'euid', 0x3d, r8}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) syz_io_uring_submit(r9, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r4, r2, r7], 0x8, 0x0, 0x1}, 0x7fff) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r10, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 425.071414] loop5: detected capacity change from 0 to 264192 [ 425.075449] tmpfs: Bad value for 'nr_inodes' [ 425.086832] loop6: detected capacity change from 0 to 264192 [ 425.093778] tmpfs: Bad value for 'nr_inodes' 09:23:28 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:23:28 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:23:28 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x10100, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) pipe2(&(0x7f0000000140), 0x84000) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x28001, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x100, 0x0) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, r0, 0x2, r0, 0x2) 09:23:28 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f0000000140)={0x3, 0x100, 0x101}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x100010, r2, 0x8000000) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r2, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0x200000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r2) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:23:28 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x0, 0x0, 0x8, 0xaa, 0x3, 0x3, 0x5, 0x29, 0x40, 0x28b, 0x81, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:23:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) 09:23:28 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:23:28 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x10100, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) pipe2(&(0x7f0000000140), 0x84000) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x28001, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, r0, 0x2, r0, 0x2) 09:23:28 executing program 3: ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x3b0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xb2d, 0x8a}}, './file0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001a00)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x9, &(0x7f00000019c0)=[r0], 0x1, 0x0, 0x1}, 0x1f) r1 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r2, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="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", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) 09:23:28 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r5], 0x8, 0x0, 0x1}, 0x7fff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r6, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 425.284229] Zero length message leads to an empty skb [ 425.287800] loop0: detected capacity change from 0 to 264192 [ 425.298414] tmpfs: Bad value for 'nr_inodes' 09:23:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) 09:23:28 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x10100, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) pipe2(&(0x7f0000000140), 0x84000) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x28001, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, r0, 0x2, r0, 0x2) 09:23:28 executing program 3: ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x3b0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001a00)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x9, &(0x7f00000019c0)=[0xffffffffffffffff], 0x1, 0x0, 0x1}, 0x1f) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="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", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) 09:23:41 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r5], 0x8, 0x0, 0x1}, 0x7fff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r6, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:23:41 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x2011, r3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq={'uid', 0x3d, r8}}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq={'euid', 0x3d, r8}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) syz_io_uring_submit(r9, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r4, r2, r7], 0x8, 0x0, 0x1}, 0x7fff) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r10, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:23:41 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r5], 0x8, 0x0, 0x1}, 0x7fff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r6, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:23:41 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x10100, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) pipe2(&(0x7f0000000140), 0x84000) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x28001, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, r0, 0x2, r0, 0x2) 09:23:41 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f0000000140)={0x3, 0x100, 0x101}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x100010, r2, 0x8000000) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r2, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r2) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:23:41 executing program 3: syz_io_uring_submit(0x0, 0x0, &(0x7f0000001a00)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x9, &(0x7f00000019c0)=[0xffffffffffffffff], 0x1, 0x0, 0x1}, 0x1f) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="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", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) 09:23:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) 09:23:41 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 438.240937] loop6: detected capacity change from 0 to 264192 [ 438.242822] loop0: detected capacity change from 0 to 264192 [ 438.244067] loop5: detected capacity change from 0 to 264192 [ 438.245489] tmpfs: Bad value for 'nr_inodes' [ 438.246486] tmpfs: Bad value for 'nr_inodes' 09:23:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x8, 0xaa, 0x3, 0x3, 0x5, 0x29, 0x40, 0x28b, 0x81, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) [ 438.249283] tmpfs: Bad value for 'nr_inodes' 09:23:41 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x1f) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="da7e59a79ae14df059cdaff071336b717226b26f239d85db2c502b743e8431a7b1bce54f955b13f17fbcdc263dd8bd509b0c52706cc15430708317bc01a00d7e53986c49e04e7b8af6d4d8d4615b29a35cc69c51039ba1065a05da7b33b9a20d59ec6261618668bfbf93c976c5a8d780b3bc8f1d31bd7f00a127c35b04fe4ede4d0b5b077c88a670ae509c10fd6cc301a3c4424356b8cae951c8a14509eaebdad9dd7c43d773619706eebe7fad5153ac543e18902ea00af9cdd1cb2858f68be35e822af827d937d485f47893b04d967c55d54720917df290374f874d6dc79ada3d5c0b953f11e07b572208ac299e204d231ef48a7554009560f8e50f", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) 09:23:41 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:23:41 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x10100, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) pipe2(&(0x7f0000000140), 0x84000) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, r0, 0x2, r0, 0x2) 09:23:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x8, 0xaa, 0x3, 0x3, 0x5, 0x29, 0x40, 0x28b, 0x81, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:23:41 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f0000000140)={0x3, 0x100, 0x101}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x100010, r2, 0x8000000) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r2) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:23:41 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="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", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) 09:23:41 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:23:55 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r5], 0x8, 0x0, 0x1}, 0x7fff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r6, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:23:55 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x2011, r3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq={'uid', 0x3d, r8}}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq={'euid', 0x3d, r8}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) syz_io_uring_submit(r9, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r4, r2, r7], 0x8, 0x0, 0x1}, 0x7fff) socket$nl_generic(0x10, 0x3, 0x10) 09:23:55 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f0000000140)={0x3, 0x100, 0x101}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x100010, r2, 0x8000000) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r2) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:23:55 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x10100, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, r0, 0x2, r0, 0x2) 09:23:55 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:23:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xaa, 0x3, 0x3, 0x5, 0x29, 0x40, 0x28b, 0x81, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:23:55 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="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", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) 09:23:55 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r5], 0x8, 0x0, 0x1}, 0x7fff) r6 = socket$nl_generic(0x10, 0x3, 0x10) [ 452.631895] loop5: detected capacity change from 0 to 264192 [ 452.639503] tmpfs: Bad value for 'nr_inodes' [ 452.651958] loop0: detected capacity change from 0 to 264192 [ 452.656020] loop6: detected capacity change from 0 to 264192 [ 452.660163] tmpfs: Bad value for 'nr_inodes' sendmsg$TEAM_CMD_NOOP(r6, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 452.664393] tmpfs: Bad value for 'nr_inodes' 09:23:55 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:23:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x5, 0x29, 0x40, 0x28b, 0x81, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:23:55 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="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", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) 09:23:55 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:23:56 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:23:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x29, 0x40, 0x28b, 0x81, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:23:56 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="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", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) 09:23:56 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f0000000140)={0x3, 0x100, 0x101}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x100010, r2, 0x8000000) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r2) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:23:56 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r5], 0x8, 0x0, 0x1}, 0x7fff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r6, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 453.091158] loop5: detected capacity change from 0 to 264192 [ 453.097273] tmpfs: Bad value for 'nr_inodes' 09:24:08 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r5], 0x8, 0x0, 0x1}, 0x7fff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r6, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:24:08 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x2011, r3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq={'uid', 0x3d, r8}}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq={'euid', 0x3d, r8}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) syz_io_uring_submit(r9, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r4, r2, r7], 0x8, 0x0, 0x1}, 0x7fff) 09:24:08 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f0000000140)={0x3, 0x100, 0x101}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x100010, r2, 0x8000000) ioctl$HIDIOCGREPORT(r2, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r2) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:24:08 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:08 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r5], 0x8, 0x0, 0x1}, 0x7fff) socket$nl_generic(0x10, 0x3, 0x10) 09:24:08 executing program 7: openat$sr(0xffffffffffffff9c, 0x0, 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x29, 0x40, 0x28b, 0x81, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:24:08 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="da7e59a79ae14df059cdaff071336b717226b26f239d85db2c502b743e8431a7b1bce54f955b13f17fbcdc263dd8bd509b0c52706cc15430708317bc01a00d7e53986c49e04e7b8af6d4d8d4615b29a35cc69c51039ba1065a05da7b33b9a20d59ec6261618668bfbf93c976c5a8d780b3bc8f1d31bd7f00a127c35b04fe4ede4d0b5b077c88a670ae509c10fd6cc301a3c4424356b8cae951c8a14509eaebdad9dd7c43d773619706eebe7fad5153ac543e18902ea00af9cdd1cb2858f68be35e822af827d937d485f47893b04d967c55d54720917df290374f874d6dc79ada3d5c0b953f11e07b572208ac299e204d231ef48a7554009560f8e50f", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) [ 465.258179] loop0: detected capacity change from 0 to 264192 [ 465.260396] tmpfs: Bad value for 'nr_inodes' [ 465.261351] loop5: detected capacity change from 0 to 264192 [ 465.263326] tmpfs: Bad value for 'nr_inodes' 09:24:08 executing program 7: openat$sr(0xffffffffffffff9c, 0x0, 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:08 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 465.287307] loop6: detected capacity change from 0 to 264192 [ 465.289546] tmpfs: Bad value for 'nr_inodes' 09:24:08 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="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", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) 09:24:08 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:08 executing program 7: openat$sr(0xffffffffffffff9c, 0x0, 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x40, 0x28b, 0x81, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:24:08 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f0000000140)={0x3, 0x100, 0x101}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x100010, r2, 0x8000000) ioctl$HIDIOCGREPORT(r2, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r2) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:24:08 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:20 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r5], 0x8, 0x0, 0x1}, 0x7fff) socket$nl_generic(0x10, 0x3, 0x10) 09:24:20 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f0000000140)={0x3, 0x100, 0x101}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x100010, r2, 0x8000000) ioctl$HIDIOCGREPORT(r2, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r2) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:24:20 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x2011, r3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq={'uid', 0x3d, r8}}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq={'euid', 0x3d, r8}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) syz_io_uring_submit(r9, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r4, r2, r7], 0x8, 0x0, 0x1}, 0x7fff) 09:24:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x28b, 0x81, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:24:20 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:20 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:20 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="da7e59a79ae14df059cdaff071336b717226b26f239d85db2c502b743e8431a7b1bce54f955b13f17fbcdc263dd8bd509b0c52706cc15430708317bc01a00d7e53986c49e04e7b8af6d4d8d4615b29a35cc69c51039ba1065a05da7b33b9a20d59ec6261618668bfbf93c976c5a8d780b3bc8f1d31bd7f00a127c35b04fe4ede4d0b5b077c88a670ae509c10fd6cc301a3c4424356b8cae951c8a14509eaebdad9dd7c43d773619706eebe7fad5153ac543e18902ea00af9cdd1cb2858f68be35e822af827d937d485f47893b04d967c55d54720917df290374f874d6dc79ada3d5c0b953f11e07b572208ac299e204d231ef48a7554009560f8e50f", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) [ 477.605441] loop6: detected capacity change from 0 to 264192 09:24:20 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 477.620467] tmpfs: Bad value for 'nr_inodes' [ 477.633012] loop0: detected capacity change from 0 to 264192 [ 477.634718] tmpfs: Bad value for 'nr_inodes' [ 477.639414] loop5: detected capacity change from 0 to 264192 [ 477.646057] tmpfs: Bad value for 'nr_inodes' 09:24:20 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="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", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) 09:24:20 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x81, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:24:20 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:20 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:20 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="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", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) 09:24:20 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r1 = socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:24:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) [ 478.014242] loop5: detected capacity change from 0 to 264192 [ 478.025983] tmpfs: Bad value for 'nr_inodes' 09:24:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x6, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:24:33 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r1 = socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:24:33 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x2011, r3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq={'uid', 0x3d, r8}}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq={'euid', 0x3d, r8}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:24:33 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r5], 0x8, 0x0, 0x1}, 0x7fff) socket$nl_generic(0x10, 0x3, 0x10) [ 490.728195] loop0: detected capacity change from 0 to 264192 09:24:33 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f0000000140)={0x3, 0x100, 0x101}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r2, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r2) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:24:33 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:33 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:33 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}, {{&(0x7f0000002080)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002100)="b20747d42f4a40379207424f29e7cb5eeb014b4f0c4a3fe27af8408603f9694c0239a413b91fd416a236c865cea1e48ff774ea45c13505626e7ce7816134897bd6001efb832b2b4a0231202e0008913c9252ca3cd580c799f41d0a1eb206d5c2300fd71ce52408fc92b71e", 0x6b}, {&(0x7f0000002180)="da7e59a79ae14df059cdaff071336b717226b26f239d85db2c502b743e8431a7b1bce54f955b13f17fbcdc263dd8bd509b0c52706cc15430708317bc01a00d7e53986c49e04e7b8af6d4d8d4615b29a35cc69c51039ba1065a05da7b33b9a20d59ec6261618668bfbf93c976c5a8d780b3bc8f1d31bd7f00a127c35b04fe4ede4d0b5b077c88a670ae509c10fd6cc301a3c4424356b8cae951c8a14509eaebdad9dd7c43d773619706eebe7fad5153ac543e18902ea00af9cdd1cb2858f68be35e822af827d937d485f47893b04d967c55d54720917df290374f874d6dc79ada3d5c0b953f11e07b572208ac299e204d231ef48a7554009560f8e50f", 0xfc}, {&(0x7f0000002280)="8649a329301d0942d3668736ce379f4e9adcb3316453172f4e158c73e6ee072fdd48cc6c48d5e13d3bd845b6764205255964a3058abb789061b85ad39b32886919764b225c45cf95689cf4bfa1d49a0bfd6406a720cbb24c5dd1fedcf0e41ad79b5bdae638242ea89b5ce66d", 0x6c}], 0x3, &(0x7f0000002380)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88, 0x40}}], 0x2, 0x880) [ 490.730024] tmpfs: Bad value for 'nr_inodes' [ 490.742934] loop5: detected capacity change from 0 to 264192 [ 490.748012] tmpfs: Bad value for 'nr_inodes' [ 490.754469] loop6: detected capacity change from 0 to 264192 [ 490.758908] tmpfs: Bad value for 'nr_inodes' 09:24:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x2, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:24:46 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r5], 0x8, 0x0, 0x1}, 0x7fff) 09:24:46 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq={'uid', 0x3d, r8}}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq={'euid', 0x3d, r8}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:24:46 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:46 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:46 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, 0x0, 0x0, 0x880) 09:24:46 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f0000000140)={0x3, 0x100, 0x101}) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:24:46 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r1 = socket(0x21, 0x0, 0x8) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 503.396476] loop6: detected capacity change from 0 to 264192 [ 503.398219] tmpfs: Bad value for 'nr_inodes' [ 503.402280] loop0: detected capacity change from 0 to 264192 [ 503.404682] tmpfs: Bad value for 'nr_inodes' [ 503.415308] loop5: detected capacity change from 0 to 264192 [ 503.420964] tmpfs: Bad value for 'nr_inodes' 09:24:46 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:46 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, 0x0, 0x0, 0x880) 09:24:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:24:46 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:46 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f0000000140)={0x3, 0x100, 0x101}) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:24:59 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:59 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f0000000140)={0x3, 0x100, 0x101}) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:24:59 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:59 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:24:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x40, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:24:59 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, 0x0, 0x0, 0x880) 09:24:59 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq={'uid', 0x3d, r8}}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq={'euid', 0x3d, r8}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:24:59 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r1 = socket(0x21, 0x0, 0x8) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:24:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x401}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) [ 516.365437] loop5: detected capacity change from 0 to 264192 [ 516.369317] loop6: detected capacity change from 0 to 264192 [ 516.373097] tmpfs: Bad value for 'nr_inodes' [ 516.376258] tmpfs: Bad value for 'nr_inodes' [ 516.383894] loop0: detected capacity change from 0 to 264192 [ 516.391007] tmpfs: Bad value for 'nr_inodes' 09:24:59 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:59 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:24:59 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x2, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:24:59 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r1 = socket(0x21, 0x0, 0x8) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:24:59 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:24:59 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440), 0x0, 0x880) [ 516.685167] loop5: detected capacity change from 0 to 264192 09:24:59 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r1, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r1) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) [ 516.710538] tmpfs: Bad value for 'nr_inodes' 09:24:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x7, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:24:59 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:24:59 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq={'uid', 0x3d, r8}}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq={'euid', 0x3d, r8}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:24:59 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 516.795903] loop0: detected capacity change from 0 to 264192 [ 516.801068] tmpfs: Bad value for 'nr_inodes' [ 516.819370] loop6: detected capacity change from 0 to 264192 [ 516.823095] tmpfs: Bad value for 'nr_inodes' 09:25:12 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:12 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq={'uid', 0x3d, r8}}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq={'euid', 0x3d, r8}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:25:12 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:25:12 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 529.736015] loop5: detected capacity change from 0 to 264192 [ 529.737963] tmpfs: Bad value for 'nr_inodes' 09:25:12 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440), 0x0, 0x880) 09:25:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x4ec, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:25:12 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:12 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r1, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r1) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) [ 529.770913] loop6: detected capacity change from 0 to 264192 [ 529.773025] tmpfs: Bad value for 'nr_inodes' 09:25:12 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 529.790415] loop0: detected capacity change from 0 to 264192 [ 529.792217] tmpfs: Bad value for 'nr_inodes' 09:25:12 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440), 0x0, 0x880) [ 529.902311] loop5: detected capacity change from 0 to 264192 [ 529.911021] tmpfs: Bad value for 'nr_inodes' 09:25:25 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:25 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:25:25 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:25:25 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:25:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x7, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:25:25 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:25 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) [ 542.441446] loop5: detected capacity change from 0 to 264192 [ 542.449083] loop6: detected capacity change from 0 to 264192 09:25:25 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r1, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r1) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) [ 542.450497] tmpfs: Bad value for 'nr_inodes' [ 542.453079] tmpfs: Bad value for 'nr_inodes' [ 542.477597] loop0: detected capacity change from 0 to 264192 [ 542.483768] tmpfs: Bad value for 'nr_inodes' 09:25:25 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:25:25 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:25:25 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xfffffffffffff059, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:25:25 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x0, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 542.635274] loop5: detected capacity change from 0 to 264192 [ 542.649279] tmpfs: Bad value for 'nr_inodes' 09:25:25 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:25:25 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:25:25 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 542.814095] loop5: detected capacity change from 0 to 264192 [ 542.825960] audit: type=1400 audit(1666603525.896:8): avc: denied { kernel } for pid=11751 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 542.826799] tmpfs: Bad value for 'nr_inodes' 09:25:38 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:38 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:25:38 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) 09:25:38 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:25:38 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f00000000c0)={0x2, 0x3, 0x1, 0x7f, 0x5b64, 0x80}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r1, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r1) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:25:38 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:25:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) [ 555.358297] loop0: detected capacity change from 0 to 264192 09:25:38 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x0, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 555.370284] loop6: detected capacity change from 0 to 264192 [ 555.375929] tmpfs: Bad value for 'nr_inodes' [ 555.379119] tmpfs: Bad value for 'nr_inodes' 09:25:38 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:38 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:25:38 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:25:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:25:38 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x0, 0x5, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:38 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:38 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:25:38 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:25:38 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 555.708899] loop6: detected capacity change from 0 to 264192 [ 555.710154] tmpfs: Bad value for 'nr_inodes' 09:25:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "8659a649954d306f35c484174384dbf2a6dbd03c3d6a6f29523040cbd5dee78417392e7740169b114441ddced215fe7c61de", ['\x00']}, 0x1aa) 09:25:51 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, r6]}, 0x8) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:25:51 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}, {&(0x7f0000001f80)="f81ef69ed874a62094a9c0c4f8782e16f5efa4103e7e9573b9", 0x19}], 0x3, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:25:51 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:51 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000080)={0x1, 0x2, 0x2, 0x0, 0x20, 0x4}) openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r1, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r1) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:25:51 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) 09:25:51 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:51 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 568.708760] loop0: detected capacity change from 0 to 264192 [ 568.711746] tmpfs: Bad value for 'nr_inodes' [ 568.712846] loop6: detected capacity change from 0 to 264192 [ 568.730235] tmpfs: Bad value for 'nr_inodes' 09:25:51 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) [ 568.760500] loop5: detected capacity change from 0 to 264192 [ 568.762097] tmpfs: Bad value for 'nr_inodes' 09:25:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 09:25:51 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:51 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:25:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f00000054c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 09:25:52 executing program 5: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:25:52 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r1, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r1) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:25:52 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:25:52 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) [ 569.012847] loop5: detected capacity change from 0 to 264192 [ 569.019639] tmpfs: Bad value for 'nr_inodes' [ 569.033056] loop0: detected capacity change from 0 to 264192 [ 569.037544] tmpfs: Bad value for 'nr_inodes' 09:25:52 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:25:52 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) [ 569.118450] loop6: detected capacity change from 0 to 264192 [ 569.121438] tmpfs: Bad value for 'nr_inodes' 09:26:07 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:26:07 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:26:07 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:26:07 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:07 executing program 5: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:26:07 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 584.084287] loop6: detected capacity change from 0 to 264192 [ 584.087276] loop0: detected capacity change from 0 to 264192 [ 584.088430] tmpfs: Bad value for 'nr_inodes' 09:26:07 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:07 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r1, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r1) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) [ 584.098646] tmpfs: Bad value for 'nr_inodes' 09:26:07 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {&(0x7f0000001f00)="000d3126ee417e3a3b8081bb9fe0d9b20aac7c4d002433a537fe96fc72d759469666be9fb5fc18654acec7a127bdf148a46ce3354ec6da17bf0b4a905c25af1509d463d3146c843b8a18986af0e6b20fb382d2fde2460707170fb97c71b77d1f9cd22b0cfa56", 0x66}], 0x2, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) [ 584.132312] loop5: detected capacity change from 0 to 264192 09:26:07 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x0, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:26:07 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:26:07 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}], 0x1, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:07 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:26:07 executing program 5: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:26:07 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:07 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x0, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 584.334942] loop5: detected capacity change from 0 to 264192 09:26:07 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}], 0x1, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:07 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:26:07 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, r4]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:26:07 executing program 5: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 584.478183] loop0: detected capacity change from 0 to 264192 [ 584.479546] tmpfs: Bad value for 'nr_inodes' 09:26:07 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 584.510210] loop6: detected capacity change from 0 to 264192 [ 584.513821] tmpfs: Bad value for 'nr_inodes' 09:26:18 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, 0xffffffffffffffff]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:26:18 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301482, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r1, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r1) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:26:18 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:26:18 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}], 0x1, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:18 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x0, 0x1, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:26:18 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:18 executing program 5: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:26:18 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 595.479850] loop0: detected capacity change from 0 to 264192 [ 595.486018] loop6: detected capacity change from 0 to 264192 [ 595.487229] tmpfs: Bad value for 'nr_inodes' 09:26:18 executing program 5: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 595.530538] tmpfs: Bad value for 'nr_inodes' 09:26:18 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="3004ce0ac835931ffb50c8e018c6ff9a1f9328aff512162ec60b37f9f27b7b90e5485db27f0d8f7163be8b41e498a8736fab4ebc211495a10c9037a08644ca9025df2cc7e4ac51135cb92dbed466e41d2af6f10a1191d02b8c68bcae87eda50f03826c73baa52d54baed8292e9ad5fb605df6518def6ee35241b651f61f0798431adb4f1b8281c93acce024a25dff1df187808d28fbe3ff3e4f72cf7beaaf87ef24d1b8cb7f72289c3c0e0304b1bef104ed3", 0xb2}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:18 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:26:18 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:18 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x0, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:26:18 executing program 5: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:26:18 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) 09:26:18 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) [ 608.035052] loop6: detected capacity change from 0 to 264192 09:26:31 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}], 0x1, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:31 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:26:31 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:31 executing program 5: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:26:31 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, 0xffffffffffffffff]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:26:31 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:26:31 executing program 2: perf_event_open$cgroup(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:26:31 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x0, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 608.047396] tmpfs: Bad value for 'nr_inodes' [ 608.071977] loop0: detected capacity change from 0 to 264192 09:26:31 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}], 0x1, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) [ 608.080684] tmpfs: Bad value for 'nr_inodes' 09:26:43 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:43 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:26:43 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, r5, 0xffffffffffffffff]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:26:43 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x0, 0x0, 0x0, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:26:43 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}], 0x1, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:43 executing program 2: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:26:43 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 620.171932] loop0: detected capacity change from 0 to 264192 09:26:43 executing program 5: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 620.195891] tmpfs: Bad value for 'nr_inodes' [ 620.239470] loop6: detected capacity change from 0 to 264192 [ 620.259020] tmpfs: Bad value for 'nr_inodes' 09:26:43 executing program 5: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:26:43 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:43 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:43 executing program 2: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:26:43 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:26:43 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, r3, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 620.679903] loop0: detected capacity change from 0 to 264192 [ 620.687226] tmpfs: Bad value for 'nr_inodes' 09:26:57 executing program 5: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:26:57 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:57 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:26:57 executing program 2: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:26:57 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:26:57 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, 0xffffffffffffffff, r5]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:26:57 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:26:57 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x8000}}], 0x1, 0x880) [ 634.348685] loop0: detected capacity change from 0 to 264192 [ 634.352763] loop6: detected capacity change from 0 to 264192 [ 634.358103] tmpfs: Bad value for 'nr_inodes' [ 634.364061] tmpfs: Bad value for 'nr_inodes' 09:26:57 executing program 5: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:26:57 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:26:57 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:26:57 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x8000}}], 0x1, 0x880) 09:26:57 executing program 2: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) socket$nl_generic(0x10, 0x3, 0x10) 09:26:57 executing program 5: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:26:57 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:26:57 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 634.681314] loop0: detected capacity change from 0 to 264192 [ 634.682763] tmpfs: Bad value for 'nr_inodes' 09:27:12 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, 0xffffffffffffffff, r5]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:27:12 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:27:12 executing program 5: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:27:12 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = socket(0x21, 0x0, 0x8) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, r2, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:27:12 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:27:12 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:27:12 executing program 2: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0xec4, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x7fff) 09:27:12 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x8000}}], 0x1, 0x880) [ 648.999426] loop6: detected capacity change from 0 to 264192 [ 649.001453] tmpfs: Bad value for 'nr_inodes' [ 649.047054] loop0: detected capacity change from 0 to 264192 [ 649.067735] tmpfs: Bad value for 'nr_inodes' 09:27:12 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:27:12 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:27:12 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x7fff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:27:12 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040), 0x0, 0x8000}}], 0x1, 0x880) 09:27:12 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:27:12 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:27:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:27:12 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:27:25 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040), 0x0, 0x8000}}], 0x1, 0x880) 09:27:25 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:27:25 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:27:25 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = socket(0x21, 0x0, 0x8) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, r4, r2, r2, 0xffffffffffffffff, r5]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:27:25 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:27:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:27:25 executing program 1: openat$hpet(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:27:25 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 662.209037] loop6: detected capacity change from 0 to 264192 [ 662.214378] loop0: detected capacity change from 0 to 264192 [ 662.218821] tmpfs: Bad value for 'nr_inodes' 09:27:25 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 662.235236] tmpfs: Bad value for 'nr_inodes' 09:27:25 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040), 0x0, 0x8000}}], 0x1, 0x880) 09:27:25 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:27:25 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:27:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:27:25 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r1, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:27:25 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:27:25 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 662.454474] loop0: detected capacity change from 0 to 264192 [ 662.486214] tmpfs: Bad value for 'nr_inodes' 09:27:25 executing program 1: openat$hpet(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:27:25 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:27:25 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:27:37 executing program 1: openat$hpet(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:27:37 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, 0x0, 0x51) 09:27:37 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:27:37 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:27:37 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r1, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:27:37 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0]}}], 0x30, 0x8000}}], 0x1, 0x880) 09:27:37 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, 0xffffffffffffffff, r2, r2, r4, r5]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:27:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) [ 674.679128] loop6: detected capacity change from 0 to 264192 [ 674.680184] loop0: detected capacity change from 0 to 264192 [ 674.685527] tmpfs: Bad value for 'nr_inodes' [ 674.696433] tmpfs: Bad value for 'nr_inodes' 09:27:37 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}], 0x30, 0x8000}}], 0x1, 0x880) 09:27:37 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r1, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:27:37 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) [ 674.785512] loop0: detected capacity change from 0 to 264192 [ 674.802119] tmpfs: Bad value for 'nr_inodes' 09:27:37 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, 0x0, 0x51) 09:27:37 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:27:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:27:37 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 674.916396] loop0: detected capacity change from 0 to 264192 [ 674.921334] tmpfs: Bad value for 'nr_inodes' 09:27:49 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:27:49 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x8000}}], 0x1, 0x880) 09:27:49 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:27:49 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:27:49 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, 0x0, 0x51) 09:27:49 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) [ 686.876114] loop6: detected capacity change from 0 to 264192 [ 686.877264] tmpfs: Bad value for 'nr_inodes' 09:27:49 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, 0xffffffffffffffff, r2, r2, r4, r5]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:27:49 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 686.903964] loop0: detected capacity change from 0 to 264192 09:27:49 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 686.913014] tmpfs: Bad value for 'nr_inodes' 09:27:50 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:27:50 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:27:50 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x3, 0x8000}}, './file0/file0\x00'}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r3, r2, r2, 0xffffffffffffffff, r2, r2, r4, r5]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:27:50 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x8000}}], 0x1, 0x880) 09:27:50 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:27:50 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:27:50 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 687.095907] loop6: detected capacity change from 0 to 264192 [ 687.100264] tmpfs: Bad value for 'nr_inodes' [ 687.111291] loop0: detected capacity change from 0 to 264192 [ 687.115911] tmpfs: Bad value for 'nr_inodes' 09:28:03 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) r3 = socket(0x21, 0x0, 0x8) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r2, r2, r3, r2, r2, r4, r5]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:28:03 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:28:03 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:28:03 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:28:03 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:28:03 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3, 0x8000}}, './file0/file0\x00'}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:28:03 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:28:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:28:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000540)=0x1, 0x8, 0x3) [ 700.526478] loop6: detected capacity change from 0 to 264192 [ 700.542837] tmpfs: Bad value for 'nr_inodes' 09:28:03 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0), 0xc, &(0x7f0000001340)={&(0x7f0000000d80)={0x5a8, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x8, 0x0, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x5, 0x7f, 0x80, 0xffffffff}, {0xfc, 0x1f, 0xb0, 0x647}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x470}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:28:03 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:28:03 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:28:03 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:28:03 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3, 0x8000}}, './file0/file0\x00'}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:28:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:28:03 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:28:14 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:28:14 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:28:14 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r3 = socket(0x21, 0x0, 0x8) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r2, r2, r3, r2, r2, r4, r5]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:28:14 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:28:14 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3, 0x8000}}, './file0/file0\x00'}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:28:14 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:28:14 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x8, 0x3) 09:28:14 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) [ 711.731011] loop6: detected capacity change from 0 to 264192 [ 711.735176] tmpfs: Bad value for 'nr_inodes' 09:28:14 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:28:14 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:28:14 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x8, 0x3) 09:28:14 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:28:14 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, 0x0, 0x0, 0x880) 09:28:14 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:28:14 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000}, 0x51) [ 711.941537] loop0: detected capacity change from 0 to 264192 [ 711.953035] tmpfs: Bad value for 'nr_inodes' 09:28:15 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:28:26 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:28:26 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:28:26 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, 0x0, 0x0, 0x880) 09:28:26 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:28:26 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:28:26 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0), 0xc, &(0x7f0000001340)={0x0}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:28:26 executing program 0: getresgid(0x0, &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:28:26 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x8, 0x3) [ 723.175659] loop0: detected capacity change from 0 to 264192 [ 723.183237] tmpfs: Bad value for 'nr_inodes' 09:28:26 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0), 0xc, &(0x7f0000001340)={0x0}, 0x1, 0x0, 0x0, 0x20000}, 0x51) 09:28:26 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, 0x0, 0x0, 0x880) 09:28:26 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540), 0x8, 0x3) 09:28:26 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:28:26 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:28:26 executing program 0: getresgid(0x0, &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:28:26 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540), 0x8, 0x3) [ 723.510214] loop0: detected capacity change from 0 to 264192 [ 723.527141] tmpfs: Bad value for 'nr_inodes' 09:28:38 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:28:38 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440), 0x0, 0x880) 09:28:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540), 0x8, 0x3) 09:28:38 executing program 0: getresgid(0x0, &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:28:38 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:28:38 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:28:38 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:28:38 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0), 0xc, &(0x7f0000001340)={0x0}}, 0x51) 09:28:38 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440), 0x0, 0x880) [ 735.107832] loop0: detected capacity change from 0 to 264192 [ 735.113111] tmpfs: Bad value for 'nr_inodes' 09:28:38 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0), 0xc, &(0x7f0000001340)={0x0}}, 0x0) 09:28:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x0, 0x3) 09:28:38 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:28:38 executing program 0: getresgid(&(0x7f0000000000), 0x0, &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:28:38 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440), 0x0, 0x880) 09:28:38 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 735.374280] loop0: detected capacity change from 0 to 264192 [ 735.388905] tmpfs: Bad value for 'nr_inodes' 09:28:38 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f00000001c0)={0x3, 0x200, 0x1f, 0x3, 0x2a7, 0x8, 0x6, 0x52, 0x9b, 0x5, 0x7fff, 0x81, 0x7, 0x4}) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:28:38 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:28:38 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0), 0xc, &(0x7f0000001340)={0x0}}, 0x0) 09:28:38 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:28:52 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:28:52 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:28:52 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x0, 0x3) 09:28:52 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:28:52 executing program 0: getresgid(&(0x7f0000000000), 0x0, &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:28:52 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:28:52 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:28:52 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001380)={&(0x7f0000000ac0), 0xc, &(0x7f0000001340)={0x0}}, 0x0) [ 749.182264] loop6: detected capacity change from 0 to 264192 [ 749.189867] tmpfs: Bad value for 'nr_inodes' [ 749.208186] loop0: detected capacity change from 0 to 264192 [ 749.216943] tmpfs: Bad value for 'nr_inodes' 09:28:52 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:29:05 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:29:05 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:29:05 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:29:05 executing program 0: getresgid(&(0x7f0000000000), 0x0, &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:29:05 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:29:05 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:29:05 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x0, 0x3) [ 762.872767] loop0: detected capacity change from 0 to 264192 [ 762.874370] tmpfs: Bad value for 'nr_inodes' 09:29:05 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 762.893984] loop6: detected capacity change from 0 to 264192 [ 762.899797] tmpfs: Bad value for 'nr_inodes' [ 762.933821] loop5: detected capacity change from 0 to 264192 09:29:06 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x0) 09:29:06 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 762.946957] tmpfs: Bad value for 'nr_inodes' 09:29:06 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:29:06 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:29:06 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) [ 763.076452] loop0: detected capacity change from 0 to 264192 [ 763.091129] tmpfs: Bad value for 'nr_inodes' 09:29:06 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x0) 09:29:06 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}}], 0x1, 0x880) 09:29:06 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:29:06 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:29:06 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:29:06 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:29:06 executing program 6: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:29:06 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 763.352885] loop6: detected capacity change from 0 to 264192 [ 763.359700] tmpfs: Bad value for 'nr_inodes' [ 763.381750] loop5: detected capacity change from 0 to 264192 [ 763.384444] tmpfs: Bad value for 'nr_inodes' 09:29:06 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x0) 09:29:06 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:29:06 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:29:20 executing program 6: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:29:20 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}}], 0x1, 0x880) 09:29:20 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:29:20 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:29:20 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:29:20 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}], 0x1, 0x880) 09:29:20 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:29:20 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 777.193106] loop2: detected capacity change from 0 to 264192 [ 777.204973] tmpfs: Bad value for 'nr_inodes' [ 777.205367] loop0: detected capacity change from 0 to 264192 [ 777.219283] loop6: detected capacity change from 0 to 264192 [ 777.225470] loop5: detected capacity change from 0 to 264192 [ 777.226916] tmpfs: Bad value for 'nr_inodes' [ 777.232098] tmpfs: Bad value for 'nr_inodes' 09:29:20 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:29:20 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001fc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002040)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}], 0x1, 0x0) 09:29:20 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:29:20 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:29:20 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}}], 0x1, 0x880) [ 777.425304] loop0: detected capacity change from 0 to 264192 [ 777.459302] loop2: detected capacity change from 0 to 264192 [ 777.474862] tmpfs: Bad value for 'nr_inodes' 09:29:20 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040), 0x0, 0x8000}}], 0x1, 0x880) 09:29:34 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:29:34 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:29:34 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040), 0x0, 0x8000}}], 0x1, 0x880) 09:29:34 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) [ 790.965034] loop2: detected capacity change from 0 to 264192 [ 790.967405] tmpfs: Bad value for 'nr_inodes' 09:29:34 executing program 6: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:29:34 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:29:34 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:29:34 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 791.005524] loop6: detected capacity change from 0 to 264192 [ 791.009959] loop0: detected capacity change from 0 to 264192 [ 791.013523] loop5: detected capacity change from 0 to 264192 [ 791.020648] loop3: detected capacity change from 0 to 264192 [ 791.021379] tmpfs: Bad value for 'nr_inodes' [ 791.022329] tmpfs: Bad value for 'nr_inodes' [ 791.025159] tmpfs: Bad value for 'nr_inodes' 09:29:34 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) 09:29:34 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040), 0x0, 0x8000}}], 0x1, 0x880) [ 791.119328] loop2: detected capacity change from 0 to 264192 [ 791.134590] tmpfs: Bad value for 'nr_inodes' 09:29:34 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:29:34 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:29:53 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) 09:29:53 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) 09:29:53 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:29:53 executing program 6: getresgid(0x0, &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:29:53 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:29:53 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:29:53 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000200)={0x1, 0x3, 0x1}) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:29:53 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) [ 810.011194] loop5: detected capacity change from 0 to 264192 [ 810.015010] loop3: detected capacity change from 0 to 264192 [ 810.018854] tmpfs: Bad value for 'nr_inodes' [ 810.021367] loop6: detected capacity change from 0 to 264192 [ 810.024432] tmpfs: Bad value for 'nr_inodes' [ 810.025541] tmpfs: Bad value for 'nr_inodes' [ 810.041967] loop2: detected capacity change from 0 to 264192 [ 810.047229] tmpfs: Bad value for 'nr_inodes' 09:29:53 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:29:53 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:29:53 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 09:29:53 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:29:53 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 810.299045] loop2: detected capacity change from 0 to 264192 [ 810.313362] tmpfs: Bad value for 'nr_inodes' 09:29:53 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:29:53 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) 09:29:53 executing program 6: getresgid(0x0, &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:29:53 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:29:53 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, 0xffffffffffffffff]}}], 0x38, 0x8000}}], 0x1, 0x880) 09:29:53 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 810.462470] loop5: detected capacity change from 0 to 264192 [ 810.464486] tmpfs: Bad value for 'nr_inodes' 09:29:53 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 810.518083] loop3: detected capacity change from 0 to 264192 [ 810.525915] loop6: detected capacity change from 0 to 264192 [ 810.527357] tmpfs: Bad value for 'nr_inodes' [ 810.531829] tmpfs: Bad value for 'nr_inodes' [ 810.554738] loop2: detected capacity change from 0 to 264192 [ 810.556474] tmpfs: Bad value for 'nr_inodes' 09:30:06 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:30:06 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:30:06 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:30:06 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:30:06 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r1, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0]}}], 0x30, 0x8000}}], 0x1, 0x880) 09:30:06 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 09:30:06 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:30:06 executing program 6: getresgid(0x0, &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 823.734357] loop6: detected capacity change from 0 to 264192 [ 823.737590] loop5: detected capacity change from 0 to 264192 [ 823.740114] loop2: detected capacity change from 0 to 264192 [ 823.743784] tmpfs: Bad value for 'nr_inodes' [ 823.744982] tmpfs: Bad value for 'nr_inodes' [ 823.745893] tmpfs: Bad value for 'nr_inodes' [ 823.747834] loop3: detected capacity change from 0 to 264192 [ 823.749816] tmpfs: Bad value for 'nr_inodes' 09:30:06 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:30:06 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}], 0x30, 0x8000}}], 0x1, 0x880) 09:30:06 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:30:06 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:30:06 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 823.972816] loop2: detected capacity change from 0 to 264192 [ 823.978961] tmpfs: Bad value for 'nr_inodes' 09:30:21 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x8000}}], 0x1, 0x880) 09:30:21 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:30:21 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) 09:30:21 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:30:21 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:30:21 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:30:21 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:30:21 executing program 6: getresgid(&(0x7f0000000000), 0x0, &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 838.169994] loop5: detected capacity change from 0 to 264192 [ 838.197038] tmpfs: Bad value for 'nr_inodes' [ 838.200829] loop2: detected capacity change from 0 to 264192 [ 838.209105] loop3: detected capacity change from 0 to 264192 [ 838.222245] loop6: detected capacity change from 0 to 264192 [ 838.224191] tmpfs: Bad value for 'nr_inodes' [ 838.229622] tmpfs: Bad value for 'nr_inodes' [ 838.236344] tmpfs: Bad value for 'nr_inodes' 09:30:21 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:30:21 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x8000}}], 0x1, 0x880) 09:30:21 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:30:21 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:30:21 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) [ 838.585743] loop2: detected capacity change from 0 to 264192 [ 838.605232] tmpfs: Bad value for 'nr_inodes' 09:30:21 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:30:21 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:30:21 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x8000}}], 0x1, 0x880) 09:30:21 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 838.761604] loop5: detected capacity change from 0 to 264192 [ 838.767411] tmpfs: Bad value for 'nr_inodes' [ 838.779146] loop3: detected capacity change from 0 to 264192 [ 838.787070] tmpfs: Bad value for 'nr_inodes' [ 852.279534] loop2: detected capacity change from 0 to 264192 [ 852.282163] loop5: detected capacity change from 0 to 264192 [ 852.285199] loop3: detected capacity change from 0 to 264192 09:30:35 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:30:35 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:30:35 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:30:35 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:30:35 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) move_pages(0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:30:35 executing program 6: getresgid(&(0x7f0000000000), 0x0, &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:30:35 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:30:35 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000340)={0x3, 0x3, 0x40, 0x1, 0x3f, 0x2d2}) [ 852.288892] tmpfs: Bad value for 'nr_inodes' [ 852.289965] tmpfs: Bad value for 'nr_inodes' [ 852.291859] tmpfs: Bad value for 'nr_inodes' [ 852.293470] loop6: detected capacity change from 0 to 264192 [ 852.298426] tmpfs: Bad value for 'nr_inodes' 09:30:35 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:30:35 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:30:35 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:30:35 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 852.511285] loop2: detected capacity change from 0 to 264192 [ 852.522150] tmpfs: Bad value for 'nr_inodes' 09:30:35 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:30:35 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:30:35 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) [ 852.644245] loop5: detected capacity change from 0 to 264192 [ 852.646254] tmpfs: Bad value for 'nr_inodes' [ 852.669474] loop3: detected capacity change from 0 to 264192 [ 852.676976] tmpfs: Bad value for 'nr_inodes' 09:30:49 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:30:49 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x5, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:30:49 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, 0x0) 09:30:49 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:30:49 executing program 6: getresgid(&(0x7f0000000000), 0x0, &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:30:49 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:30:49 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) [ 866.094890] loop6: detected capacity change from 0 to 264192 09:30:49 executing program 2: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 866.105200] tmpfs: Bad value for 'nr_inodes' [ 866.118090] loop2: detected capacity change from 0 to 264192 [ 866.125135] tmpfs: Bad value for 'nr_inodes' [ 866.140252] loop3: detected capacity change from 0 to 264192 [ 866.144382] tmpfs: Bad value for 'nr_inodes' 09:30:49 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:30:49 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:30:49 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x5, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:30:49 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:30:49 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 866.324939] loop2: detected capacity change from 0 to 264192 [ 866.345269] tmpfs: Bad value for 'nr_inodes' 09:31:02 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:31:02 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:31:02 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:31:02 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:31:02 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x5, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:31:02 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:31:02 executing program 2: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 879.674291] loop3: detected capacity change from 0 to 264192 [ 879.676380] tmpfs: Bad value for 'nr_inodes' [ 879.679666] loop6: detected capacity change from 0 to 264192 09:31:02 executing program 1: openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, 0x0) [ 879.686765] tmpfs: Bad value for 'nr_inodes' [ 879.698311] loop2: detected capacity change from 0 to 264192 09:31:02 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:31:02 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x5, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:31:02 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:31:02 executing program 2: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:31:02 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 879.888713] loop5: detected capacity change from 0 to 264192 [ 879.902940] tmpfs: Bad value for 'nr_inodes' [ 879.928349] loop2: detected capacity change from 0 to 264192 09:31:03 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:31:03 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x5, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:31:03 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:31:03 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:31:03 executing program 2: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:31:03 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:31:03 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 880.103510] loop5: detected capacity change from 0 to 264192 [ 880.105065] loop2: detected capacity change from 0 to 264192 [ 880.113902] tmpfs: Bad value for 'nr_inodes' [ 880.134055] loop3: detected capacity change from 0 to 264192 [ 880.141526] tmpfs: Bad value for 'nr_inodes' [ 880.154253] loop6: detected capacity change from 0 to 264192 [ 880.158531] tmpfs: Bad value for 'nr_inodes' 09:31:16 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:31:16 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x5, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:31:16 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:31:16 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:31:16 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 893.659015] loop5: detected capacity change from 0 to 264192 09:31:16 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:31:16 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:31:16 executing program 1: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) [ 893.665790] loop3: detected capacity change from 0 to 264192 [ 893.667255] tmpfs: Bad value for 'nr_inodes' [ 893.667413] tmpfs: Bad value for 'nr_inodes' [ 893.675389] loop6: detected capacity change from 0 to 264192 [ 893.682952] loop2: detected capacity change from 0 to 264192 [ 893.683380] tmpfs: Bad value for 'nr_inodes' 09:31:16 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x5, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:31:16 executing program 1: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:31:16 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:31:16 executing program 5: getresgid(0x0, &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:31:16 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:31:16 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 893.885271] loop5: detected capacity change from 0 to 264192 [ 893.897607] tmpfs: Bad value for 'nr_inodes' [ 893.901413] loop2: detected capacity change from 0 to 264192 09:31:16 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x5, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:31:17 executing program 5: getresgid(0x0, &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:31:30 executing program 5: getresgid(0x0, &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:31:30 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x5, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:31:30 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:31:30 executing program 1: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:31:30 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, 0xffffffffffffffff]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:31:30 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:31:30 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:31:30 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) [ 907.324506] loop3: detected capacity change from 0 to 264192 [ 907.327418] loop2: detected capacity change from 0 to 264192 [ 907.329890] loop6: detected capacity change from 0 to 264192 [ 907.332004] tmpfs: Bad value for 'nr_inodes' [ 907.339987] loop5: detected capacity change from 0 to 264192 [ 907.345092] tmpfs: Bad value for 'nr_inodes' 09:31:30 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:31:30 executing program 1: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 09:31:30 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x5, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:31:30 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:31:30 executing program 5: getresgid(&(0x7f0000000000), 0x0, &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:31:30 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 907.542955] tmpfs: Bad value for 'nr_inodes' [ 907.567488] loop5: detected capacity change from 0 to 264192 [ 907.577406] tmpfs: Bad value for 'nr_inodes' 09:31:30 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:31:30 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:31:30 executing program 1: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 907.706463] tmpfs: Bad value for 'nr_inodes' 09:31:44 executing program 1: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') socket$unix(0x1, 0x1, 0x0) 09:31:44 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:31:44 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:31:44 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:31:44 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:31:44 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, 0xffffffffffffffff]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:31:44 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:31:44 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 921.456329] loop5: detected capacity change from 0 to 264192 [ 921.458427] tmpfs: Bad value for 'nr_inodes' [ 921.473802] loop6: detected capacity change from 0 to 264192 [ 921.477306] tmpfs: Bad value for 'nr_inodes' [ 921.477858] loop3: detected capacity change from 0 to 264192 [ 921.490868] tmpfs: Bad value for 'nr_inodes' 09:31:44 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:31:44 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:31:44 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:31:44 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:31:44 executing program 1: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') 09:31:44 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 921.660716] tmpfs: Bad value for 'nr_inodes' [ 921.671093] loop5: detected capacity change from 0 to 264192 09:31:57 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 934.859861] loop5: detected capacity change from 0 to 264192 [ 934.864832] tmpfs: Bad value for 'nr_inodes' 09:31:57 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:31:57 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:31:57 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, 0xffffffffffffffff]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:31:57 executing program 1: syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') 09:31:57 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x8000}}], 0x1, 0x880) 09:31:57 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:31:57 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x3, &(0x7f00000002c0)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 934.885951] loop3: detected capacity change from 0 to 264192 [ 934.887502] tmpfs: Bad value for 'nr_inodes' [ 934.891241] loop6: detected capacity change from 0 to 264192 09:31:58 executing program 1: syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') 09:31:58 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:31:58 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x3, &(0x7f00000002c0)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:31:58 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}], 0x1, 0x880) 09:31:58 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:31:58 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 935.076501] loop5: detected capacity change from 0 to 264192 09:31:58 executing program 1: syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') 09:31:58 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:31:58 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:31:58 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x3, &(0x7f00000002c0)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 935.256709] loop5: detected capacity change from 0 to 264192 09:32:11 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:32:11 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}], 0x1, 0x880) 09:32:11 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:32:11 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:32:11 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:32:11 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:32:11 executing program 1: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 09:32:11 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 948.646175] loop5: detected capacity change from 0 to 264192 [ 948.654486] loop3: detected capacity change from 0 to 264192 [ 948.657316] loop6: detected capacity change from 0 to 264192 [ 948.660989] tmpfs: Bad value for 'nr_inodes' 09:32:11 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:32:11 executing program 1: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 09:32:11 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}], 0x1, 0x880) 09:32:11 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:32:11 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:32:11 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 948.876080] loop5: detected capacity change from 0 to 264192 [ 948.897469] tmpfs: Bad value for 'nr_inodes' 09:32:25 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:32:25 executing program 1: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 09:32:25 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:32:25 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001d80)='net/psched\x00') r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000001dc0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002040)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x8000}}], 0x1, 0x0) 09:32:25 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:32:25 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:32:25 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:32:25 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 962.251488] loop6: detected capacity change from 0 to 264192 [ 962.255165] loop3: detected capacity change from 0 to 264192 [ 962.256442] tmpfs: Bad value for 'nr_inodes' [ 962.256842] tmpfs: Bad value for 'nr_inodes' [ 962.264158] tmpfs: Bad value for 'nr_inodes' 09:32:25 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:32:25 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:32:25 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 962.424372] tmpfs: Bad value for 'nr_inodes' 09:32:25 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 962.469135] tmpfs: Unknown parameter 'obj_type' 09:32:25 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) [ 962.568788] tmpfs: Bad value for 'nr_inodes' 09:32:38 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:32:38 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:32:38 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:32:38 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:32:38 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:32:38 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:32:38 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:32:38 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 975.730634] loop6: detected capacity change from 0 to 264192 [ 975.730911] loop3: detected capacity change from 0 to 264192 [ 975.733745] loop1: detected capacity change from 0 to 264192 [ 975.736159] tmpfs: Unknown parameter 'obj_type' [ 975.739239] tmpfs: Bad value for 'nr_inodes' [ 975.741268] tmpfs: Bad value for 'nr_inodes' [ 975.742782] tmpfs: Unknown parameter 'obj_type' [ 975.749978] tmpfs: Bad value for 'nr_inodes' 09:32:38 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:32:38 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:32:38 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:32:38 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:32:38 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) [ 975.950527] tmpfs: Unknown parameter 'obj_type' [ 975.986453] tmpfs: Unknown parameter 'obj_type' [ 975.988705] tmpfs: Bad value for 'nr_inodes' 09:32:39 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:32:39 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:32:39 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:32:39 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:32:39 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:32:39 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r1, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:32:39 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) [ 976.159994] tmpfs: Bad value for 'nr_inodes' [ 976.173291] tmpfs: Unknown parameter 'obj_type' 09:32:39 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 976.187414] loop3: detected capacity change from 0 to 264192 [ 976.193509] loop1: detected capacity change from 0 to 264192 [ 976.194820] tmpfs: Unknown parameter 'obj_type' [ 976.198509] tmpfs: Bad value for 'nr_inodes' [ 976.200101] tmpfs: Bad value for 'nr_inodes' 09:32:39 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x3, 0x8000}}, './file0/file0\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[r1, r0, r0, 0xffffffffffffffff, r0, r0, r2, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:32:39 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:32:53 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:32:53 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) 09:32:53 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:32:53 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r1, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:32:53 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:32:53 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:32:53 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r1, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:32:53 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 989.979978] loop1: detected capacity change from 0 to 264192 [ 989.985651] tmpfs: Bad value for 'nr_inodes' [ 989.986718] tmpfs: Unknown parameter 'obj_type' [ 989.992505] tmpfs: Unknown parameter 'obj_type' [ 989.996998] tmpfs: Bad value for 'nr_inodes' [ 990.005988] loop3: detected capacity change from 0 to 264192 [ 990.010113] tmpfs: Bad value for 'nr_inodes' 09:32:53 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r1, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:32:53 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) 09:32:53 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:32:53 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:32:53 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 990.245244] tmpfs: Unknown parameter 'obj_type' [ 990.266773] tmpfs: Unknown parameter 'obj_type' [ 990.300977] tmpfs: Bad value for 'nr_inodes' 09:32:53 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r1, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:33:06 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:33:06 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r1, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:33:06 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r1, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:33:06 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:33:06 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) 09:33:06 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:06 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:33:06 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) [ 1003.678952] loop3: detected capacity change from 0 to 264192 [ 1003.681339] tmpfs: Unknown parameter 'obj_type' [ 1003.685778] tmpfs: Unknown parameter 'obj_type' [ 1003.686666] loop1: detected capacity change from 0 to 264192 [ 1003.688172] tmpfs: Bad value for 'nr_inodes' [ 1003.689050] tmpfs: Bad value for 'nr_inodes' [ 1003.692738] tmpfs: Unknown parameter 'obj_type' [ 1003.694842] tmpfs: Bad value for 'nr_inodes' 09:33:06 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:33:06 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:33:06 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:06 executing program 4: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:06 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 1003.877022] tmpfs: Unknown parameter 'obj_type' [ 1003.925940] tmpfs: Unknown parameter 'obj_type' 09:33:07 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:33:07 executing program 3: r0 = socket(0x21, 0x0, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 1004.059220] tmpfs: Unknown parameter 'obj_type' 09:33:20 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) 09:33:20 executing program 3: r0 = socket(0x21, 0x0, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:33:20 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:33:20 executing program 4: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:20 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:33:20 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:33:20 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:33:20 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 1017.468686] loop1: detected capacity change from 0 to 264192 [ 1017.475026] tmpfs: Unknown parameter 'obj_type' [ 1017.479025] tmpfs: Bad value for 'nr_inodes' [ 1017.485999] tmpfs: Bad value for 'nr_inodes' [ 1017.496825] tmpfs: Unknown parameter 'obj_type' 09:33:20 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:33:20 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:20 executing program 4: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:20 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:33:20 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 1017.685864] tmpfs: Unknown parameter 'obj_type' [ 1017.735221] tmpfs: Unknown parameter 'obj_type' 09:33:20 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r1, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:33:20 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:20 executing program 3: r0 = socket(0x21, 0x0, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:33:20 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) [ 1017.881760] tmpfs: Unknown parameter 'obj_type' [ 1017.898867] loop1: detected capacity change from 0 to 264192 [ 1017.909503] tmpfs: Bad value for 'nr_inodes' 09:33:34 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:33:34 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:34 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) 09:33:34 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:33:34 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:33:34 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r1, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:33:34 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:34 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) [ 1031.387599] loop1: detected capacity change from 0 to 264192 [ 1031.387848] tmpfs: Bad value for 'nr_inodes' [ 1031.391310] tmpfs: Unknown parameter 'obj_type' [ 1031.395777] tmpfs: Bad value for 'nr_inodes' [ 1031.397312] loop3: detected capacity change from 0 to 264192 09:33:34 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:34 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r1, 0xffffffffffffffff]}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:33:34 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:34 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:33:34 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:33:48 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:33:48 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:33:48 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:33:48 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:33:48 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:48 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:33:48 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:48 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 1045.176381] loop1: detected capacity change from 0 to 264192 [ 1045.182679] loop3: detected capacity change from 0 to 264192 [ 1045.185849] tmpfs: Bad value for 'nr_inodes' [ 1045.199915] tmpfs: Bad value for 'nr_inodes' 09:33:48 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:33:48 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:48 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:48 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:33:48 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) [ 1045.408320] tmpfs: Unknown parameter 'obj_type' 09:33:48 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) [ 1045.488099] tmpfs: Unknown parameter 'obj_type' 09:33:48 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:33:48 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 09:33:48 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) 09:33:48 executing program 3: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:33:48 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:33:48 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 1045.596879] loop1: detected capacity change from 0 to 264192 [ 1045.598636] tmpfs: Bad value for 'nr_inodes' [ 1045.620468] tmpfs: Unknown parameter 'obj_type' [ 1045.622061] tmpfs: Unknown parameter 'obj_type' [ 1045.635266] loop3: detected capacity change from 0 to 264192 [ 1045.650271] tmpfs: Bad value for 'nr_inodes' 09:34:02 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:02 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:34:02 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:02 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0)}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:34:02 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:02 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000500)) 09:34:02 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:02 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) [ 1059.333638] loop3: detected capacity change from 0 to 264192 [ 1059.339528] tmpfs: Unknown parameter 'obj_type' [ 1059.355198] tmpfs: Unknown parameter 'obj_type' [ 1059.357610] loop1: detected capacity change from 0 to 264192 [ 1059.371301] tmpfs: Bad value for 'nr_inodes' 09:34:02 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000500)) 09:34:02 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:02 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:34:02 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0)}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:34:02 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 1059.604889] tmpfs: Unknown parameter 'obj_type' [ 1072.870870] loop1: detected capacity change from 0 to 264192 09:34:15 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000500)) 09:34:15 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0)}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:34:15 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:15 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:15 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x20000, 0x0) 09:34:15 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:15 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:15 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 1072.885506] loop3: detected capacity change from 0 to 264192 [ 1072.895572] tmpfs: Bad value for 'nr_inodes' [ 1072.906036] tmpfs: Unknown parameter 'obj_type' 09:34:16 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:16 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), 0x0) 09:34:16 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 09:34:16 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x20000, 0x0) 09:34:16 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x0, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 1073.142076] tmpfs: Unknown parameter 'obj_type' 09:34:16 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:16 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:16 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0xffffffffffffffff, 0x4, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), 0x0) 09:34:16 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 1073.304519] tmpfs: Unknown parameter 'obj_type' [ 1073.306751] loop3: detected capacity change from 0 to 264192 [ 1073.318082] loop1: detected capacity change from 0 to 264192 [ 1073.322373] tmpfs: Bad value for 'nr_inodes' [ 1086.811962] tmpfs: Unknown parameter 'obj_type' [ 1086.814176] tmpfs: Bad value for 'nr_inodes' 09:34:29 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x0, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:34:29 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 09:34:29 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:29 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:29 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:29 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:29 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:29 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x20000, 0x0) [ 1086.832101] loop1: detected capacity change from 0 to 264192 [ 1086.838355] tmpfs: Unknown parameter 'obj_type' [ 1086.841042] tmpfs: Bad value for 'nr_inodes' 09:34:29 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) 09:34:29 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:30 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x0, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:34:30 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 1087.057635] tmpfs: Unknown parameter 'obj_type' [ 1087.071426] tmpfs: Unknown parameter 'obj_type' 09:34:30 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) 09:34:30 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r1]}, 0x8) 09:34:30 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:30 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:30 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 1087.248204] loop1: detected capacity change from 0 to 264192 09:34:30 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 1087.258001] tmpfs: Bad value for 'nr_inodes' [ 1087.261916] tmpfs: Unknown parameter 'obj_type' [ 1087.289011] tmpfs: Bad value for 'nr_inodes' [ 1087.291047] tmpfs: Unknown parameter 'obj_type' [ 1087.295954] tmpfs: Bad value for 'nr_inodes' 09:34:44 executing program 5: getresgid(&(0x7f0000000000), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) 09:34:44 executing program 2: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:44 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:44 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r1]}, 0x8) 09:34:44 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:44 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:44 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 1101.000376] tmpfs: Bad value for 'nr_inodes' 09:34:44 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x0, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 1101.018833] loop1: detected capacity change from 0 to 264192 [ 1101.020941] tmpfs: Unknown parameter 'obj_type' [ 1101.024229] tmpfs: Unknown parameter 'obj_type' [ 1101.029327] tmpfs: Unknown parameter 'obj_type' [ 1101.034431] tmpfs: Bad value for 'nr_inodes' 09:34:44 executing program 2: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:44 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r1]}, 0x8) 09:34:44 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:44 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x0, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 1101.231002] loop1: detected capacity change from 0 to 264192 [ 1101.245300] tmpfs: Bad value for 'nr_inodes' 09:34:44 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 1101.275836] tmpfs: Bad value for 'nr_inodes' [ 1101.282666] tmpfs: Unknown parameter 'obj_type' 09:34:57 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:57 executing program 2: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:57 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x0, 0x6, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:34:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) 09:34:57 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:57 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 1114.763486] tmpfs: Bad value for 'nr_inodes' [ 1114.768069] tmpfs: Unknown parameter 'obj_type' 09:34:57 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:57 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) [ 1114.797605] tmpfs: Bad value for 'nr_inodes' [ 1114.802389] loop1: detected capacity change from 0 to 264192 [ 1114.819184] tmpfs: Unknown parameter 'obj_type' 09:34:57 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:58 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:58 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x0, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 1115.019384] tmpfs: Unknown parameter 'obj_type' 09:34:58 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:58 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:58 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) 09:34:58 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:34:58 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) 09:34:58 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:58 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:34:58 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x0, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 1115.255087] tmpfs: Bad value for 'nr_inodes' [ 1115.258253] loop1: detected capacity change from 0 to 264192 [ 1115.300294] tmpfs: Unknown parameter 'obj_type' [ 1115.311594] tmpfs: Bad value for 'nr_inodes' [ 1129.255344] loop1: detected capacity change from 0 to 264192 09:35:12 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:35:12 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:35:12 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) 09:35:12 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) 09:35:12 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:35:12 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x0, 0x3, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:35:12 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:35:12 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) [ 1129.291301] tmpfs: Bad value for 'nr_inodes' [ 1129.298581] tmpfs: Unknown parameter 'obj_type' [ 1129.306324] tmpfs: Unknown parameter 'obj_type' 09:35:12 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:35:12 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x0, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:35:12 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:35:12 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) [ 1129.595759] tmpfs: Unknown parameter 'obj_type' 09:35:12 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) [ 1129.657578] loop1: detected capacity change from 0 to 264192 09:35:26 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:35:26 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) 09:35:26 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) socket(0x21, 0x0, 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:35:26 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x0, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:35:26 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:35:26 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:35:26 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:35:26 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 1143.041178] tmpfs: Bad value for 'nr_inodes' [ 1143.065124] loop1: detected capacity change from 0 to 264192 [ 1143.071857] tmpfs: Unknown parameter 'obj_type' [ 1143.077013] tmpfs: Unknown parameter 'obj_type' 09:35:26 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:35:26 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:35:26 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x0, 0x2, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 1143.361991] tmpfs: Unknown parameter 'subj_user' 09:35:26 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) socket(0x21, 0x0, 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:35:26 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) 09:35:26 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) 09:35:26 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:35:26 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:35:26 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:35:26 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 1143.510508] tmpfs: Bad value for 'nr_inodes' [ 1143.525679] loop1: detected capacity change from 0 to 264192 09:35:26 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x0, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 1143.558709] tmpfs: Unknown parameter 'subj_user' 09:35:26 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:35:26 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 1143.683102] tmpfs: Bad value for 'size' [ 1143.807595] tmpfs: Unknown parameter 'subj_user' 09:35:40 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) 09:35:40 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:35:40 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) 09:35:40 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:35:40 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) socket(0x21, 0x0, 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:35:40 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) 09:35:40 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x0, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:35:40 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 1157.459902] tmpfs: Unknown parameter 'obj_type' [ 1157.469325] tmpfs: Bad value for 'nr_inodes' [ 1157.474922] tmpfs: Bad value for 'nr_inodes' [ 1157.478973] tmpfs: Bad value for 'nr_inodes' 09:35:40 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) 09:35:40 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) [ 1157.580336] tmpfs: Bad value for 'size' 09:35:40 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x0, 0x0, 0xfffffffa, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 1157.707500] tmpfs: Unknown parameter 'obj_type' 09:35:40 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) [ 1157.845129] tmpfs: Bad value for 'nr_inodes' 09:35:54 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) r2 = socket(0x21, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:35:54 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:35:54 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) 09:35:54 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:35:54 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) 09:35:54 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) 09:35:54 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:35:54 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) [ 1171.111985] tmpfs: Unknown parameter 'obj_type' [ 1171.131132] tmpfs: Bad value for 'nr_inodes' [ 1171.136628] tmpfs: Bad value for 'nr_inodes' [ 1171.147032] tmpfs: Unknown parameter 'obj_type' 09:35:54 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:35:54 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:35:54 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) [ 1171.262500] tmpfs: Bad value for 'size' 09:35:54 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) [ 1171.327102] tmpfs: Unknown parameter 'obj_type' 09:35:54 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:35:54 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:35:54 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:35:54 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 1171.547904] tmpfs: Unknown parameter 'obj_type' [ 1171.550922] tmpfs: Bad value for 'nr_inodes' [ 1171.552922] tmpfs: Unknown parameter 'obj_type' 09:36:08 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:36:08 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 09:36:08 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) 09:36:08 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) r2 = socket(0x0, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:36:08 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:36:08 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) 09:36:08 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 1185.111242] tmpfs: Unknown parameter 'obj_type' 09:36:08 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) [ 1185.153024] tmpfs: Bad value for 'nr_inodes' [ 1185.158232] tmpfs: Unknown parameter 'obj_type' [ 1185.163906] tmpfs: Unknown parameter 'obj_type' [ 1185.170399] tmpfs: Bad value for 'nr_inodes' 09:36:08 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x20000, 0x0) 09:36:08 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:36:08 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, 0x0}, 0x0) [ 1185.431790] tmpfs: Unknown parameter 'obj_type' 09:36:08 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:36:08 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 09:36:08 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x20000, 0x0) 09:36:08 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x8) 09:36:08 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) [ 1185.570038] tmpfs: Bad value for 'nr_inodes' [ 1185.609708] tmpfs: Bad value for 'nr_inodes' 09:36:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, 0x0}, 0x0) 09:36:22 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:36:22 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) 09:36:22 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 09:36:22 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x20000, 0x0) 09:36:22 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, 0x0}, 0x0) 09:36:22 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:36:22 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) r2 = socket(0x0, 0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 1199.154305] tmpfs: Unknown parameter 'obj_type' [ 1199.165111] tmpfs: Bad value for 'nr_inodes' [ 1199.171895] tmpfs: Bad value for 'nr_inodes' [ 1199.174822] tmpfs: Unknown parameter 'obj_type' [ 1199.187341] tmpfs: Unknown parameter 'obj_type' 09:36:22 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) 09:36:22 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, 0x0}, 0x0) 09:36:22 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000003000)={0x1, 0x80, 0x8, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002fc0), 0x8}, 0x0, 0x0, 0x999, 0x7, 0x6, 0x3, 0x2, 0x0, 0xfffffffa}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) 09:36:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, 0x0}, 0x0) 09:36:22 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}, {@huge_always}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, 0xffffffffffffffff, r2]}, 0x8) [ 1199.454640] tmpfs: Unknown parameter 'obj_type' 09:36:22 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) 09:36:22 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x34]}}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) socket(0x21, 0x0, 0x8) 09:36:22 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}, 0x7) 09:36:22 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, 0x0}, 0x0) 09:36:22 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@nr_inodes}], [{@obj_type={'obj_type', 0x3d, ','}}, {@subj_user={'subj_user', 0x3d, '\\}:/({,'}}, {@smackfsdef={'smackfsdef', 0x3d, '@'}}, {@obj_type={'obj_type', 0x3d, '.'}}, {@subj_role}]}) r1 = socket(0x21, 0x0, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r1, r0, r0, r2, r3]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 09:36:22 executing program 6: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@obj_type={'obj_type', 0x3d, ','}}]}) r2 = socket(0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000440)={0x80000001, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r1, r2, r1, r1, r3, r4]}, 0x8) socketpair(0x1e, 0x6, 0xffffff01, &(0x7f0000000480)) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000540)=0x1, 0x8, 0x3) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000880)=[{&(0x7f0000000600)="b8f1dabe1e2f517dae24ca6d0e940aa61094583a72701f66f82b43d90ca34ab84d7c044648d1f09664f9ea6e33358e051ca937ccbbe2e6b305ae325db2e7a65eb92f5a79bfe7a1b5cc7f63ea42cda117ec72cba2a47228980e4ed10b7a88d0824cecfdc55adf753eeef529b3eea80a86d32ce85c253a4e5fb8347e9526c602372edc5f6fd8cea5257979a268461a865729c57992676a4a6bcd91145fedfc63671950ecc0d1", 0xa5, 0x80}, {&(0x7f00000006c0)="be041893d8e9a1cc3fb4ccd0f9035017a72a68c4cb106a297b570c07b4f1a6085af0621d2ceab67c107e83014060af343dfa3e5ddb0e0cafc6e355a1734bd9b8c3a7ea5a9ac32d2fce3c17c94166576ad52980e0b0f0daca8a7688b5e2e2f8b0fe59cdf2560dccbb598b0a51be9054fa1dc9be0dd6ac9d186dcfc04cecce4001e95b5506978e040f6d7672be95b0800f1459b0f4a13c521a1d91", 0x9a}, {&(0x7f0000000780)="9b06688bbf2f410c539a1cf25ca31f3b8ee7ddf413e32cb7b3dac146337632df172e7c04a07b9232ee15b24a9aea5e827469ae738449e6f7fafe79dbc855ba1647d4adf29ff4e0f3837ef53fdf4e966629d8c01ca16c7a31be708b9441c0c23085334f341a1c6cdc82feafad5157e29bdeeb01b7d662cebb6ef17d0fb9199a3f0e96f8d5164355e30e5d53d86461338bf4aa7b13d36c0d6bad1d530e1862f244c007e0e78d917cafb1237f2b55fb4c27b792342876d1729c91ea5e55066409b0f54c1435963eedf150c3aaac07ea18a024f1ea9aa8fd2c94efa997c5ee9ebb5f487dea85fd0b33f07057d46f", 0xec, 0x8}], 0x130020, &(0x7f0000000900)={[{@gid={'gid', 0x3d, r0}}, {@gid}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}, {@size={'size', 0x3d, [0x6b, 0x2d, 0x36, 0x39, 0x6d, 0x37, 0x6d, 0x25]}}, {@gid}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x67, 0x34, 0x78, 0x6d, 0x25, 0x6d, 0x39, 0x6b, 0x67, 0x74]}}], [{@seclabel}, {@hash}, {@obj_role={'obj_role', 0x3d, 'subj_user'}}, {@uid_eq}, {@subj_role={'subj_role', 0x3d, '%'}}, {@fsname={'fsname', 0x3d, '[%'}}, {@euid_eq}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 1199.568108] tmpfs: Bad value for 'nr_inodes' [ 1199.590053] tmpfs: Unknown parameter 'obj_type' [ 1199.607341] tmpfs: Bad value for 'nr_inodes' [ 1199.657044] tmpfs: Unknown parameter 'obj_type' [ 1199.660098] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 1199.661047] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 1199.661615] CPU: 1 PID: 14428 Comm: syz-executor.3 Not tainted 6.1.0-rc1-next-20221021 #1 [ 1199.662291] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1199.662929] RIP: 0010:_parse_integer_fixup_radix+0x60/0x2a0 [ 1199.663474] Code: 02 00 00 41 8b 2c 24 31 ff 89 ee e8 3a fa 36 ff 85 ed 75 66 e8 01 fe 36 ff 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 48 89 da 83 e2 07 38 d0 7f 08 84 c0 0f 85 e6 01 00 00 [ 1199.664824] RSP: 0018:ffff888035fcfa40 EFLAGS: 00010256 [ 1199.665215] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000e266000 [ 1199.665907] RDX: 0000000000000000 RSI: ffffffff821119af RDI: 0000000000000005 [ 1199.666548] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000 [ 1199.667153] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888035fcfa90 [ 1199.667797] R13: ffff888035fcfbd8 R14: 000000007fffffff R15: ffff8880322994d0 [ 1199.668408] FS: 00007f967b20c700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 1199.669114] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1199.672097] CR2: 00007fe7426898e0 CR3: 0000000036462000 CR4: 0000000000350ee0 [ 1199.672728] Call Trace: [ 1199.672960] [ 1199.673171] simple_strntoull+0x88/0x180 [ 1199.673558] ? simple_strntoull+0x0/0x180 [ 1199.673936] ? do_syscall_64+0x3b/0xa0 [ 1199.674333] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1199.674818] ? lock_acquire+0x1b2/0x540 [ 1199.675199] memparse+0x72/0x210 [ 1199.675517] ? memparse+0x0/0x210 [ 1199.675835] ? __fs_parse+0x278/0x8c0 [ 1199.676181] shmem_parse_one+0x7c5/0xb70 [ 1199.676558] ? shmem_parse_one+0x0/0xb70 [ 1199.676925] ? shmem_parse_one+0x206/0xb70 [ 1199.677341] ? shmem_parse_one+0x0/0xb70 [ 1199.677704] vfs_parse_fs_param+0x204/0x3d0 [ 1199.678079] vfs_parse_fs_string+0xdb/0x190 [ 1199.678483] ? vfs_parse_fs_string+0x0/0x190 [ 1199.678877] shmem_parse_options+0x160/0x260 [ 1199.679273] path_mount+0x12c8/0x1e30 [ 1199.679610] ? kasan_quarantine_put+0x8b/0x200 [ 1199.680026] ? path_mount+0x0/0x1e30 [ 1199.680360] ? putname+0xfe/0x150 [ 1199.680674] __x64_sys_mount+0x282/0x310 [ 1199.681026] ? __x64_sys_mount+0x0/0x310 [ 1199.681387] ? syscall_enter_from_user_mode+0x1d/0x60 [ 1199.681852] do_syscall_64+0x3b/0xa0 [ 1199.682233] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1199.682688] RIP: 0033:0x7f967dc9804a [ 1199.683011] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1199.684535] RSP: 002b:00007f967b20bfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1199.685178] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f967dc9804a [ 1199.685804] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 00007f967b20c000 [ 1199.686451] RBP: 00007f967b20c040 R08: 00007f967b20c040 R09: 0000000020000180 [ 1199.687039] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000180 [ 1199.687682] R13: 00000000200001c0 R14: 00007f967b20c000 R15: 0000000020000240 [ 1199.688300] [ 1199.688504] Modules linked in: [ 1199.689728] ---[ end trace 0000000000000000 ]--- [ 1199.690164] RIP: 0010:_parse_integer_fixup_radix+0x60/0x2a0 [ 1199.690814] Code: 02 00 00 41 8b 2c 24 31 ff 89 ee e8 3a fa 36 ff 85 ed 75 66 e8 01 fe 36 ff 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 48 89 da 83 e2 07 38 d0 7f 08 84 c0 0f 85 e6 01 00 00 [ 1199.692456] RSP: 0018:ffff888035fcfa40 EFLAGS: 00010256 [ 1199.692929] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000e266000 [ 1199.693624] RDX: 0000000000000000 RSI: ffffffff821119af RDI: 0000000000000005 [ 1199.694281] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000 [ 1199.694921] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888035fcfa90 [ 1199.695512] R13: ffff888035fcfbd8 R14: 000000007fffffff R15: ffff8880322994d0 [ 1199.696111] FS: 00007f967b20c700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 1199.696796] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1199.697304] CR2: 00007fe7426898e0 CR3: 0000000036462000 CR4: 0000000000350ee0 VM DIAGNOSIS: 09:36:22 Registers: info registers vcpu 0 RAX=dffffc0000000000 RBX=ffffffff8524e020 RCX=0000000000000000 RDX=ffff88800dcc5040 RSI=ffffffff81489303 RDI=ffffffff8524e020 RBP=00007f2d6bc46d82 RSP=ffff888039b47310 R8 =0000000000000005 R9 =0000000000000000 R10=0000000080000000 R11=0000000000036001 R12=00007f2d6bc46d82 R13=0000000000000000 R14=ffff88800dcc5040 R15=0000000000000000 RIP=ffffffff8132c2aa RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f2d6b723368 CR3=0000000017f0e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=756e696c2d34365f3638782f62696c2f XMM01=322e6f732e6c6462696c2f756e672d78 XMM02=00322e6f732e6c6462696c2f756e672d XMM03=78756e696c2d34365f3638782f62696c XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000035 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8242cd21 RDI=ffffffff87b8ea20 RBP=ffffffff87b8e9e0 RSP=ffff888035fcf3c0 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000035 R11=0000000000000001 R12=0000000000000035 R13=ffffffff87b8e9e0 R14=0000000000000010 R15=ffffffff8242cd10 RIP=ffffffff8242cd79 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f967b20c700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fe7426898e0 CR3=0000000036462000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000