x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:48:54 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)='u', 0x1}, {&(0x7f0000001700)="06", 0x1}], 0x0, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2016.555188] loop6: detected capacity change from 0 to 14 [ 2016.557450] tmpfs: Unknown parameter 'hash' 18:48:54 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a", 0x21, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:48:54 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 2016.586784] loop4: detected capacity change from 0 to 14 [ 2016.644965] loop2: detected capacity change from 0 to 14 18:49:07 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:49:07 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:49:07 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b06", 0x23, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:49:07 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:49:07 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)='u', 0x1}, {&(0x7f0000001700)="06", 0x1}], 0x80001, 0x0) 18:49:07 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x0, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:49:07 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 2029.216310] loop4: detected capacity change from 0 to 14 [ 2029.250015] loop6: detected capacity change from 0 to 14 [ 2029.250596] loop2: detected capacity change from 0 to 14 18:49:07 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r3 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2029.280551] loop3: detected capacity change from 0 to 14 18:49:07 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x0, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:49:20 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:49:20 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:49:20 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x0, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:49:20 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r3 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:49:20 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:49:20 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b06", 0x23, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:49:20 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:49:20 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)='u', 0x1}, {&(0x7f0000001700)="06", 0x1}], 0x80001, 0x0) [ 2042.188608] loop4: detected capacity change from 0 to 14 [ 2042.212283] loop2: detected capacity change from 0 to 14 [ 2042.215387] loop6: detected capacity change from 0 to 14 18:49:20 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:49:20 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:49:20 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 2042.278607] loop3: detected capacity change from 0 to 14 18:49:20 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2042.321226] loop4: detected capacity change from 0 to 14 18:49:20 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b06", 0x23, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2042.383913] loop6: detected capacity change from 0 to 14 18:49:20 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)='u', 0x1}, {&(0x7f0000001700)="06", 0x1}], 0x80001, 0x0) 18:49:20 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2042.446445] loop2: detected capacity change from 0 to 14 18:49:20 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r3 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000001840)={0x9, [], 0x80, "6525fe3ff0a391"}) 18:49:20 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2042.468284] loop4: detected capacity change from 0 to 14 18:49:20 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2042.533047] loop6: detected capacity change from 0 to 14 18:49:20 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x0, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:49:20 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:49:20 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:49:20 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2042.558473] loop3: detected capacity change from 0 to 14 18:49:20 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2042.609692] loop4: detected capacity change from 0 to 14 18:49:20 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2042.685646] loop6: detected capacity change from 0 to 14 18:49:34 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x0, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:49:34 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x1, &(0x7f0000001780)=[{&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:49:34 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r3 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000001840)={0x9, [], 0x80, "6525fe3ff0a391"}) 18:49:34 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:49:34 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:49:34 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:49:34 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:49:34 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)='u', 0x1}, {&(0x7f0000001700)="06", 0x1}], 0x80001, &(0x7f00000017c0)={[{@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2056.415001] loop4: detected capacity change from 0 to 14 [ 2056.448286] loop6: detected capacity change from 0 to 14 18:49:34 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x1, &(0x7f0000001780)=[{&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:49:34 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2056.502982] loop3: detected capacity change from 0 to 14 [ 2056.530292] loop4: detected capacity change from 0 to 14 18:49:34 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:49:34 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:49:34 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:49:34 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x1, &(0x7f0000001780)=[{&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:49:34 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r3 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000001840)={0x9, [], 0x80, "6525fe3ff0a391"}) 18:49:34 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)='u', 0x1}, {&(0x7f0000001700)="06", 0x1}], 0x80001, &(0x7f00000017c0)={[], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2056.687080] loop4: detected capacity change from 0 to 14 [ 2056.693095] loop6: detected capacity change from 0 to 14 [ 2056.718618] loop3: detected capacity change from 0 to 14 18:49:49 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{0x0, 0x0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:49:49 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:49:49 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)='u', 0x1}, {&(0x7f0000001700)="06", 0x1}], 0x80001, &(0x7f00000017c0)={[], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 18:49:49 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:49:49 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:49:49 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r3 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000001840)={0x9, [], 0x80, "6525fe3ff0a391"}) 18:49:49 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:49:49 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x0, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2071.758488] loop4: detected capacity change from 0 to 14 18:49:49 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:49:49 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{0x0, 0x0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2071.793543] loop3: detected capacity change from 0 to 14 [ 2071.794714] loop6: detected capacity change from 0 to 14 18:49:49 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)='u', 0x1}, {&(0x7f0000001700)="06", 0x1}], 0x80001, &(0x7f00000017c0)={[], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 18:49:49 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r3 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000001840)={0x9, [], 0x80, "6525fe3ff0a391"}) [ 2071.978141] loop3: detected capacity change from 0 to 14 18:50:03 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:50:03 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r3 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000001840)={0x9, [], 0x80, "6525fe3ff0a391"}) 18:50:03 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:50:03 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{0x0, 0x0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:03 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:50:03 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)='u', 0x1}, {&(0x7f0000001700)="06", 0x1}], 0x80001, &(0x7f00000017c0)={[], [{@hash}, {@dont_measure}]}) 18:50:03 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:03 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2085.314201] loop6: detected capacity change from 0 to 14 [ 2085.357733] loop3: detected capacity change from 0 to 14 18:50:03 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2085.398742] loop4: detected capacity change from 0 to 14 18:50:03 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)='u', 0x1}, {&(0x7f0000001700)="06", 0x1}], 0x80001, &(0x7f00000017c0)={[], [{@hash}]}) 18:50:03 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 2085.430172] loop6: detected capacity change from 0 to 14 18:50:03 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:03 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:03 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:03 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640), 0x0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2085.634728] loop6: detected capacity change from 0 to 14 [ 2085.635592] loop4: detected capacity change from 0 to 14 [ 2085.641768] loop3: detected capacity change from 0 to 14 18:50:17 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:17 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:17 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)='u', 0x1}, {&(0x7f0000001700)="06", 0x1}], 0x80001, &(0x7f00000017c0)) 18:50:17 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:50:17 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:50:17 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640), 0x0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:17 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:17 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:50:17 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 2099.889375] loop6: detected capacity change from 0 to 14 [ 2099.914138] loop4: detected capacity change from 0 to 14 [ 2099.920648] loop3: detected capacity change from 0 to 14 18:50:17 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640), 0x0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:17 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2100.036269] loop6: detected capacity change from 0 to 14 18:50:18 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:50:18 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:18 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:18 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:50:18 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f", 0x58, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2100.125697] loop4: detected capacity change from 0 to 14 [ 2100.164109] loop3: detected capacity change from 0 to 14 18:50:31 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:50:31 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:31 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:50:31 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2113.755471] loop6: detected capacity change from 0 to 14 18:50:31 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:31 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640), 0x0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:31 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:31 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2113.763255] loop4: detected capacity change from 0 to 14 [ 2113.785142] loop3: detected capacity change from 0 to 14 18:50:31 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 2113.820598] loop0: detected capacity change from 0 to 14 18:50:31 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:31 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x0, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:31 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640), 0x0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:31 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2113.902596] loop6: detected capacity change from 0 to 14 [ 2113.909192] loop4: detected capacity change from 0 to 14 18:50:31 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 2114.026316] loop3: detected capacity change from 0 to 14 18:50:44 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:50:44 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:50:44 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x0, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:44 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:44 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:44 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640), 0x0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:44 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:50:44 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2126.988550] loop3: detected capacity change from 0 to 14 [ 2127.026686] loop6: detected capacity change from 0 to 14 [ 2127.029769] loop0: detected capacity change from 0 to 14 [ 2127.038922] loop4: detected capacity change from 0 to 14 18:50:45 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:45 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x0, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:45 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:50:45 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:45 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84", 0x2c, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2127.174096] loop3: detected capacity change from 0 to 14 [ 2127.188267] loop6: detected capacity change from 0 to 14 18:50:45 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:45 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 2127.239284] loop4: detected capacity change from 0 to 14 18:50:45 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2127.276124] loop0: detected capacity change from 0 to 14 [ 2127.314939] loop6: detected capacity change from 0 to 14 18:50:45 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:50:45 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:45 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:45 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:50:45 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:45 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:50:45 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2127.433877] loop4: detected capacity change from 0 to 14 [ 2127.439759] loop3: detected capacity change from 0 to 14 [ 2127.446756] loop0: detected capacity change from 0 to 14 [ 2127.458465] loop6: detected capacity change from 0 to 14 18:50:58 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:50:58 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:50:58 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84", 0x2c, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:58 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:58 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:58 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:58 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:58 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:50:58 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 2140.900246] loop3: detected capacity change from 0 to 14 [ 2140.910892] loop4: detected capacity change from 0 to 14 [ 2140.943443] loop6: detected capacity change from 0 to 14 [ 2140.952796] loop0: detected capacity change from 0 to 14 18:50:58 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:50:58 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:50:58 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:50:58 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84", 0x2c, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2141.078503] loop4: detected capacity change from 0 to 14 [ 2141.095323] loop3: detected capacity change from 0 to 14 18:51:13 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:51:13 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:13 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:51:13 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:51:13 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:51:13 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:13 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:13 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640), 0x0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2156.010008] loop6: detected capacity change from 0 to 14 [ 2156.015964] loop0: detected capacity change from 0 to 14 [ 2156.043568] loop3: detected capacity change from 0 to 14 [ 2156.061090] loop4: detected capacity change from 0 to 14 18:51:14 executing program 5: getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:51:14 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:51:14 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:14 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640), 0x0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:51:14 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:14 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2156.300720] loop0: detected capacity change from 0 to 14 [ 2156.303659] loop3: detected capacity change from 0 to 14 [ 2156.311715] loop6: detected capacity change from 0 to 14 [ 2156.331201] loop4: detected capacity change from 0 to 14 18:51:27 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:51:27 executing program 5: getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:51:27 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:27 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:51:27 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640), 0x0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:51:27 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:51:27 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:27 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2170.029794] loop4: detected capacity change from 0 to 14 [ 2170.067568] loop3: detected capacity change from 0 to 14 [ 2170.077004] loop6: detected capacity change from 0 to 14 [ 2170.083521] loop0: detected capacity change from 0 to 14 18:51:28 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:28 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce", 0x16, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:51:28 executing program 5: getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x82, 0x9048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:51:28 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:51:28 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2170.209048] loop4: detected capacity change from 0 to 14 18:51:28 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:28 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x0, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:28 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce", 0x16, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2170.290617] loop6: detected capacity change from 0 to 14 [ 2170.312219] loop3: detected capacity change from 0 to 14 [ 2170.330799] loop0: detected capacity change from 0 to 14 18:51:42 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:42 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:51:42 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:42 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x0, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:42 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce", 0x16, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:51:42 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:51:42 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:51:42 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2184.223003] loop4: detected capacity change from 0 to 14 [ 2184.293699] loop6: detected capacity change from 0 to 14 18:51:42 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2184.313106] loop5: detected capacity change from 0 to 14 [ 2184.314659] loop0: detected capacity change from 0 to 14 18:51:42 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364", 0x21, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2184.344734] loop3: detected capacity change from 0 to 14 [ 2184.369632] loop4: detected capacity change from 0 to 14 18:51:42 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x0, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:42 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:42 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:42 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:51:42 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2184.508582] loop4: detected capacity change from 0 to 14 18:51:42 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2184.545387] loop5: detected capacity change from 0 to 14 [ 2184.568513] loop6: detected capacity change from 0 to 14 18:51:42 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364", 0x21, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:51:42 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2184.601779] loop0: detected capacity change from 0 to 14 [ 2184.611282] loop3: detected capacity change from 0 to 14 18:51:42 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:42 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2184.677524] loop4: detected capacity change from 0 to 14 [ 2184.713023] loop5: detected capacity change from 0 to 14 18:51:55 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:51:55 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:55 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:51:55 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364", 0x21, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:51:55 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:51:55 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:51:55 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) 18:51:55 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2197.907811] loop6: detected capacity change from 0 to 14 [ 2197.911350] loop3: detected capacity change from 0 to 14 [ 2197.918434] loop4: detected capacity change from 0 to 14 [ 2197.933307] loop0: detected capacity change from 0 to 14 18:52:08 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:52:08 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) 18:52:08 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:52:08 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:08 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698", 0x27, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:08 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:08 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:08 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2210.505325] loop4: detected capacity change from 0 to 14 18:52:08 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) [ 2210.535497] loop3: detected capacity change from 0 to 14 [ 2210.536340] loop0: detected capacity change from 0 to 14 [ 2210.543166] loop6: detected capacity change from 0 to 14 18:52:08 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2210.619099] loop4: detected capacity change from 0 to 14 18:52:08 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698", 0x27, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:08 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) 18:52:08 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:08 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:08 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:08 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2210.722562] loop0: detected capacity change from 0 to 14 [ 2210.754451] loop6: detected capacity change from 0 to 14 [ 2210.768248] loop4: detected capacity change from 0 to 14 [ 2210.781336] loop3: detected capacity change from 0 to 14 18:52:21 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 18:52:21 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:52:21 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:52:21 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:21 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:21 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:21 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698", 0x27, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:21 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2223.216151] loop3: detected capacity change from 0 to 14 [ 2223.229116] loop0: detected capacity change from 0 to 14 [ 2223.256243] loop6: detected capacity change from 0 to 14 [ 2223.272340] loop4: detected capacity change from 0 to 14 18:52:21 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:21 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:21 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:21 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2223.361795] loop3: detected capacity change from 0 to 14 [ 2223.365622] loop0: detected capacity change from 0 to 14 18:52:21 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 18:52:21 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:21 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e3", 0x22, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:21 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:21 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2223.471312] loop6: detected capacity change from 0 to 14 [ 2223.513184] loop3: detected capacity change from 0 to 14 [ 2223.517711] loop4: detected capacity change from 0 to 14 [ 2223.542427] loop0: detected capacity change from 0 to 14 18:52:21 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:52:21 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 18:52:21 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:21 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:52:21 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2223.645779] loop3: detected capacity change from 0 to 14 18:52:21 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2223.674095] loop6: detected capacity change from 0 to 14 [ 2223.742360] loop4: detected capacity change from 0 to 14 18:52:34 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:52:34 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f", 0x1d, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:34 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:34 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 18:52:34 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:34 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:34 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:34 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2236.936241] loop0: detected capacity change from 0 to 14 [ 2236.961066] loop6: detected capacity change from 0 to 14 [ 2236.966984] loop4: detected capacity change from 0 to 14 18:52:34 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2237.000549] loop3: detected capacity change from 0 to 14 18:52:34 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:52:34 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2237.087195] loop0: detected capacity change from 0 to 14 18:52:35 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 18:52:35 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:35 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:35 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce6037", 0x18, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2237.155102] loop6: detected capacity change from 0 to 14 [ 2237.175325] loop4: detected capacity change from 0 to 14 18:52:35 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2237.239718] loop3: detected capacity change from 0 to 14 18:52:35 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:35 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce6037", 0x18, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:35 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2237.339969] loop0: detected capacity change from 0 to 14 [ 2237.366611] loop4: detected capacity change from 0 to 14 18:52:48 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:52:48 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:48 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:52:48 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:48 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 18:52:48 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:48 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:48 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661d", 0x13, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2250.460191] loop0: detected capacity change from 0 to 14 [ 2250.460741] loop3: detected capacity change from 0 to 14 18:52:48 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2250.480414] loop6: detected capacity change from 0 to 14 [ 2250.511083] loop4: detected capacity change from 0 to 14 18:52:48 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:52:48 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, 0x0, 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:48 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:52:48 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2250.622734] loop3: detected capacity change from 0 to 14 [ 2250.659334] loop6: detected capacity change from 0 to 14 [ 2250.686708] loop0: detected capacity change from 0 to 14 [ 2250.738900] loop4: detected capacity change from 0 to 14 18:53:02 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:53:02 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 18:53:02 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:02 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:02 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, 0x0, 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:02 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:02 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:02 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661d", 0x13, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2264.813914] loop0: detected capacity change from 0 to 14 [ 2264.825712] loop3: detected capacity change from 0 to 14 [ 2264.856054] loop6: detected capacity change from 0 to 14 [ 2264.871947] loop4: detected capacity change from 0 to 14 18:53:02 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2264.975597] loop0: detected capacity change from 0 to 14 18:53:16 executing program 0: perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:16 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:16 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661d", 0x13, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:53:16 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2278.910261] loop0: detected capacity change from 0 to 14 18:53:16 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 18:53:16 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:16 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, 0x0, 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:16 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2278.939970] loop4: detected capacity change from 0 to 14 [ 2278.942255] loop3: detected capacity change from 0 to 14 18:53:16 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:16 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2279.016672] loop6: detected capacity change from 0 to 14 18:53:16 executing program 0: perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2279.099494] loop3: detected capacity change from 0 to 14 [ 2279.118522] loop0: detected capacity change from 0 to 14 [ 2279.132393] loop4: detected capacity change from 0 to 14 18:53:17 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce", 0x16, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:53:17 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:17 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:17 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:53:17 executing program 0: perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:17 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2279.254384] loop3: detected capacity change from 0 to 14 [ 2279.264470] loop0: detected capacity change from 0 to 14 [ 2279.283275] loop6: detected capacity change from 0 to 14 [ 2279.298341] loop5: detected capacity change from 0 to 14 18:53:17 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:17 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce", 0x16, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:53:17 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2279.366731] loop4: detected capacity change from 0 to 14 18:53:31 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:31 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce", 0x16, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:53:31 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:53:31 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:31 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:31 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:31 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:31 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2293.463465] loop6: detected capacity change from 0 to 14 [ 2293.496058] loop5: detected capacity change from 0 to 14 [ 2293.497077] loop4: detected capacity change from 0 to 14 [ 2293.501718] loop0: detected capacity change from 0 to 14 [ 2293.503742] loop3: detected capacity change from 0 to 14 18:53:31 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:31 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce60", 0x17, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:53:31 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:31 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:53:31 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:53:31 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2293.737324] loop6: detected capacity change from 0 to 14 [ 2293.777679] loop0: detected capacity change from 0 to 14 [ 2293.782479] loop5: detected capacity change from 0 to 14 [ 2293.784805] loop3: detected capacity change from 0 to 14 [ 2293.821215] loop4: detected capacity change from 0 to 14 18:53:31 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:31 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:31 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:31 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2293.998001] loop6: detected capacity change from 0 to 14 [ 2294.037020] loop3: detected capacity change from 0 to 14 [ 2307.255683] loop5: detected capacity change from 0 to 14 18:53:45 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:45 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:45 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:45 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:45 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce60", 0x17, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:53:45 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:45 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:45 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2307.302730] loop6: detected capacity change from 0 to 14 18:53:45 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2307.339485] loop4: detected capacity change from 0 to 14 [ 2307.344687] loop0: detected capacity change from 0 to 14 [ 2307.355616] loop3: detected capacity change from 0 to 14 [ 2307.389531] loop5: detected capacity change from 0 to 14 18:53:45 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:45 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:45 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2307.502744] loop4: detected capacity change from 0 to 14 [ 2307.541959] loop6: detected capacity change from 0 to 14 18:53:57 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:57 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:57 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), 0x0, 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:57 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:57 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:53:57 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:57 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:57 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce", 0x16, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2319.681767] loop5: detected capacity change from 0 to 14 [ 2319.683718] loop4: detected capacity change from 0 to 14 [ 2319.705653] loop0: detected capacity change from 0 to 14 [ 2319.718678] loop3: detected capacity change from 0 to 14 18:53:57 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:57 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2319.756881] loop6: detected capacity change from 0 to 14 18:53:57 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce", 0x16, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2319.814525] loop5: detected capacity change from 0 to 14 [ 2319.816764] loop4: detected capacity change from 0 to 14 18:53:57 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:57 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:53:57 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:57 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:57 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), 0x0, 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2319.951184] loop0: detected capacity change from 0 to 14 [ 2319.962081] loop5: detected capacity change from 0 to 14 [ 2319.966339] loop4: detected capacity change from 0 to 14 18:53:57 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2319.998109] loop3: detected capacity change from 0 to 14 18:53:57 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:57 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2320.058440] loop6: detected capacity change from 0 to 14 18:53:57 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:53:57 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:53:58 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce", 0x16, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2320.102873] loop4: detected capacity change from 0 to 14 [ 2320.104646] loop5: detected capacity change from 0 to 14 [ 2320.119411] loop0: detected capacity change from 0 to 14 18:54:12 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:12 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:54:12 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4c", 0x15, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:54:12 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:54:12 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), 0x0, 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:12 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:54:12 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:12 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2334.176480] loop0: detected capacity change from 0 to 14 [ 2334.191428] loop6: detected capacity change from 0 to 14 [ 2334.193606] loop3: detected capacity change from 0 to 14 18:54:12 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4c", 0x15, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2334.234659] loop4: detected capacity change from 0 to 14 [ 2334.236041] loop5: detected capacity change from 0 to 14 18:54:25 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:54:25 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:25 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:25 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc", 0x14, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:54:25 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:25 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:54:25 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:25 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2347.312305] loop0: detected capacity change from 0 to 14 [ 2347.317653] loop5: detected capacity change from 0 to 14 [ 2347.319493] loop6: detected capacity change from 0 to 14 [ 2347.350146] loop3: detected capacity change from 0 to 14 [ 2347.360542] loop4: detected capacity change from 0 to 14 18:54:25 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:25 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:25 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc", 0x14, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2347.444147] loop5: detected capacity change from 0 to 14 [ 2347.445204] loop6: detected capacity change from 0 to 14 18:54:25 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:25 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:25 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:25 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:54:25 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2347.582559] loop4: detected capacity change from 0 to 14 [ 2347.621744] loop6: detected capacity change from 0 to 14 18:54:25 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:54:25 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc", 0x14, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:54:25 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2347.651763] loop0: detected capacity change from 0 to 14 [ 2347.666989] loop3: detected capacity change from 0 to 14 [ 2347.684476] loop5: detected capacity change from 0 to 14 [ 2347.715615] loop4: detected capacity change from 0 to 14 18:54:39 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:54:39 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x0, 0x0, 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:39 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:54:39 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4c", 0x15}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2362.056911] loop0: detected capacity change from 0 to 14 18:54:39 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:54:39 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:39 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:39 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2362.106459] loop3: detected capacity change from 0 to 14 [ 2362.108074] loop4: detected capacity change from 0 to 14 18:54:40 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2362.142539] loop5: detected capacity change from 0 to 14 18:54:40 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x0, 0x0, 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:40 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2362.220137] loop0: detected capacity change from 0 to 14 18:54:40 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:54:40 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:40 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4c", 0x15}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x0, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:54:40 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:54:40 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x0, 0x0, 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:40 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2362.336451] loop3: detected capacity change from 0 to 14 [ 2362.342870] loop4: detected capacity change from 0 to 14 [ 2362.355945] tmpfs: Unknown parameter 'hash' [ 2362.359068] loop5: detected capacity change from 0 to 14 18:54:40 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2362.402365] loop0: detected capacity change from 0 to 14 18:54:54 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:54:54 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:54 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x1, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:54 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:54 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:54:54 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4c", 0x15}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x0, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:54:54 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:54:54 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2376.885233] tmpfs: Unknown parameter 'hash' [ 2376.917780] loop0: detected capacity change from 0 to 14 [ 2376.922022] loop5: detected capacity change from 0 to 14 18:54:54 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4c", 0x15}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x0, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2376.968739] loop4: detected capacity change from 0 to 14 [ 2376.975270] loop3: detected capacity change from 0 to 14 18:54:54 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:54:54 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:54 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x1, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:54:54 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2377.041066] tmpfs: Unknown parameter 'hash' [ 2377.075063] loop5: detected capacity change from 0 to 14 [ 2377.179583] loop0: detected capacity change from 0 to 14 18:55:07 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:55:07 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:55:07 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4c", 0x15}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:55:07 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:07 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x1, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:07 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:07 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:55:07 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2389.475727] loop5: detected capacity change from 0 to 14 [ 2389.521295] loop0: detected capacity change from 0 to 14 [ 2389.526661] loop4: detected capacity change from 0 to 14 [ 2389.528542] loop3: detected capacity change from 0 to 14 18:55:07 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:07 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4c", 0x15}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:55:07 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {0x0, 0x0, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2389.643731] loop5: detected capacity change from 0 to 14 [ 2389.648294] loop6: detected capacity change from 0 to 14 18:55:07 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:55:07 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:07 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:07 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:07 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {0x0, 0x0, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2389.757112] loop5: detected capacity change from 0 to 14 18:55:07 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4c", 0x15}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2389.780184] loop6: detected capacity change from 0 to 14 18:55:07 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2389.802387] loop0: detected capacity change from 0 to 14 18:55:07 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:07 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2389.843619] loop3: detected capacity change from 0 to 14 18:55:07 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {0x0, 0x0, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2389.860298] loop4: detected capacity change from 0 to 14 [ 2389.914707] loop5: detected capacity change from 0 to 14 [ 2389.920112] loop6: detected capacity change from 0 to 14 18:55:07 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2390.031255] loop0: detected capacity change from 0 to 14 18:55:21 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:55:21 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:55:21 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:55:21 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:21 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:21 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4c", 0x15}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[{@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:55:21 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700), 0x0, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:21 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x8, [0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2403.727220] loop6: detected capacity change from 0 to 14 [ 2403.728468] loop5: detected capacity change from 0 to 14 [ 2403.730742] loop0: detected capacity change from 0 to 14 [ 2403.759041] loop4: detected capacity change from 0 to 14 [ 2403.769051] loop3: detected capacity change from 0 to 14 18:55:21 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700), 0x0, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:21 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2403.991719] loop0: detected capacity change from 0 to 14 [ 2404.017693] loop6: detected capacity change from 0 to 14 18:55:37 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700), 0x0, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:37 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:37 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:55:37 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:37 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:37 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2419.927279] loop0: detected capacity change from 0 to 14 18:55:37 executing program 1: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) geteuid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') [ 2419.948292] loop6: detected capacity change from 0 to 14 18:55:37 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4c", 0x15}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:55:37 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2419.975400] loop5: detected capacity change from 0 to 14 [ 2419.994122] loop4: detected capacity change from 0 to 14 [ 2420.012570] loop3: detected capacity change from 0 to 14 18:55:37 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a2", 0x3d, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:38 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2420.077435] loop0: detected capacity change from 0 to 14 18:55:38 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:38 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) [ 2420.125299] loop6: detected capacity change from 0 to 14 [ 2420.138999] loop5: detected capacity change from 0 to 14 18:55:38 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a2", 0x3d, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:38 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') r4 = syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4c", 0x15}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063c", 0x24}], 0x80001, &(0x7f00000017c0)={[], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000001840)={0x9, [{r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {}, {r0}, {}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {r0}, {}, {r0}, {}, {}, {r0}, {r0}, {}, {r0}, {r0}, {}, {r0}, {r0}, {r0}, {r0}], 0x80, "6525fe3ff0a391"}) 18:55:38 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(r1, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2420.247077] loop3: detected capacity change from 0 to 14 [ 2420.250502] loop6: detected capacity change from 0 to 14 [ 2420.252362] loop4: detected capacity change from 0 to 14 [ 2420.266472] loop5: detected capacity change from 0 to 14 18:55:38 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) mkdirat(r0, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) 18:55:38 executing program 7: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3f, 0x80, 0x2, 0x7, 0x0, 0x82, 0x9048, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x8008, 0x1, 0x1, 0x9, 0x1, 0xc6, 0xffff, 0x0, 0x101, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) geteuid() perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x1, 0x20, 0x7, 0x0, 0x7101, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x11020, 0x3, 0x6, 0x5, 0x8001, 0xcc, 0x101, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$unix(0x1, 0x1, 0x0) geteuid() getegid() syz_open_dev$vcsn(&(0x7f00000017c0), 0x228, 0x1010c0) syz_open_dev$mouse(&(0x7f0000001800), 0x80000000, 0x4041) getpgrp(r0) r1 = fork() syz_open_procfs(r1, &(0x7f0000001bc0)='net/ip6_tables_targets\x00') 18:55:38 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x6, 0x1ff, 0x2}, 0x10, [0x0, 0x0]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x0) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0x0, 0x2}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') syz_open_dev$vcsa(&(0x7f0000001540), 0x100000001, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a21cabc5beccf130446acfc032995d83867dbdca7c38f125894e5365db084f4c6420b54d93f5a5c6a0c02a8077cd83a6b1b1867a416c5386dfc34a6a22", 0x79, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2420.331791] ------------[ cut here ]------------ [ 2420.332685] WARNING: CPU: 0 PID: 82976 at kernel/events/core.c:2233 event_filter_match+0x422/0x660 [ 2420.333958] Modules linked in: [ 2420.334399] CPU: 0 PID: 82976 Comm: syz-executor.2 Not tainted 6.0.0-rc5-next-20220914 #1 [ 2420.335452] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2420.336885] RIP: 0010:event_filter_match+0x422/0x660 [ 2420.337563] Code: 00 00 00 e9 7c fc ff ff e8 4b 15 f1 ff 65 8b 2d c0 73 ad 7e 31 ff 89 ee e8 eb 11 f1 ff 85 ed 0f 84 ef 00 00 00 e8 2e 15 f1 ff <0f> 0b eb 9f e8 25 80 23 00 e9 17 fc ff ff e8 1b 15 f1 ff 48 8d 7b [ 2420.339901] RSP: 0000:ffff88806ce09c70 EFLAGS: 00010046 [ 2420.340616] RAX: 0000000080010002 RBX: ffff88803aa4a2b0 RCX: 0000000000000000 [ 2420.341540] RDX: ffff88803a690000 RSI: ffffffff81550212 RDI: 0000000000000005 [ 2420.342541] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000001 [ 2420.343523] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88803aa4a4d0 [ 2420.345037] R13: 0000000000000000 R14: ffff88803aa4a358 R15: ffff88803aa4a4d0 [ 2420.346293] FS: 00005555563a0400(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 2420.347354] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2420.348135] CR2: 00007fdb30c86f64 CR3: 0000000019f2c000 CR4: 0000000000350ef0 [ 2420.349076] Call Trace: [ 2420.349434] [ 2420.349765] merge_sched_in+0x107/0x1110 [ 2420.350331] visit_groups_merge.constprop.0.isra.0+0x4fc/0xef0 [ 2420.351150] ? merge_sched_in+0x1110/0x1110 [ 2420.351742] ? lock_is_held_type+0xd7/0x130 [ 2420.352358] ctx_sched_in+0x2e6/0x770 [ 2420.352907] ? lock_acquire+0x1b2/0x530 [ 2420.353484] ? visit_groups_merge.constprop.0.isra.0+0xef0/0xef0 [ 2420.354341] ? lock_is_held_type+0xd7/0x130 [ 2420.354972] perf_event_sched_in+0x75/0x80 [ 2420.355570] ctx_resched+0x1ce/0x390 [ 2420.356107] __perf_install_in_context+0x285/0x9c0 [ 2420.356790] ? ctx_resched+0x390/0x390 [ 2420.357344] remote_function+0x125/0x1b0 [ 2420.357936] __flush_smp_call_function_queue+0x1df/0x5a0 [ 2420.358693] ? perf_duration_warn+0x40/0x40 [ 2420.359324] __sysvec_call_function_single+0x92/0x3a0 [ 2420.360052] sysvec_call_function_single+0x89/0xc0 [ 2420.360746] [ 2420.361061] [ 2420.361381] asm_sysvec_call_function_single+0x16/0x20 [ 2420.362137] RIP: 0010:do_wp_page+0x618/0x2050 [ 2420.362787] Code: df 48 89 ca 48 c1 ea 03 0f b6 14 02 48 89 c8 83 e0 07 83 c0 03 38 d0 7c 0c 84 d2 74 08 48 89 cf e8 9d 22 0f 00 41 8b 44 24 34 03 00 00 00 89 c6 89 44 24 18 e8 38 b4 dc ff 8b 44 24 18 83 f8 [ 2420.365246] RSP: 0000:ffff88803ca17cb8 EFLAGS: 00000246 [ 2420.366007] RAX: 0000000000000003 RBX: 0000000000000000 RCX: ffffea0000cbb174 [ 2420.367003] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffea0000cbb174 [ 2420.367994] RBP: ffff88803ca17d88 R08: 0000000000000000 R09: ffffea0000cbb177 [ 2420.368984] R10: fffff9400019762e R11: 0000000000000001 R12: ffffea0000cbb140 [ 2420.369983] R13: ffff888039bb3410 R14: ffff88803ca17dd8 R15: ffff88803ca17db0 [ 2420.371003] ? do_wp_page+0x5e0/0x2050 [ 2420.371588] __handle_mm_fault+0x11eb/0x35e0 [ 2420.372224] ? lock_is_held_type+0xd7/0x130 [ 2420.372836] ? __pmd_alloc+0x690/0x690 [ 2420.373401] ? handle_mm_fault+0x6fd/0xa20 [ 2420.374006] handle_mm_fault+0x2e6/0xa20 [ 2420.374602] do_user_addr_fault+0x536/0x1300 [ 2420.375264] exc_page_fault+0x98/0x1a0 [ 2420.375851] asm_exc_page_fault+0x22/0x30 [ 2420.376457] RIP: 0033:0x7fdb30b1f742 [ 2420.376962] Code: 49 83 ff 10 0f 84 cf 00 00 00 49 69 c7 c0 00 00 00 80 7b f8 00 44 89 7c 24 70 48 8d 6b f4 48 89 5c 24 28 48 89 44 24 38 75 bc 43 f8 01 31 c0 b9 40 42 0f 00 ba 81 00 00 00 44 89 7b f4 48 89 [ 2420.379459] RSP: 002b:00007ffd2bdf5360 EFLAGS: 00010246 [ 2420.380210] RAX: 0000000000000000 RBX: 00007fdb30c86f6c RCX: 0000000000000000 [ 2420.381139] RDX: 00007ffd2bdf54b8 RSI: 0000000000000000 RDI: 00007ffd2bdf54e8 [ 2420.382117] RBP: 00007fdb30c86f60 R08: 0000000000000000 R09: 0000000000000000 [ 2420.383134] R10: 0000000000000008 R11: 0000000000000016 R12: 00007fdb30c8b330 [ 2420.384136] R13: 00007ffd2bdf5460 R14: 00007fdb30c86f60 R15: 0000000000000000 [ 2420.385139] [ 2420.385479] irq event stamp: 1518 [ 2420.385987] hardirqs last enabled at (1517): [] handle_mm_fault+0x6fd/0xa20 [ 2420.387211] hardirqs last disabled at (1518): [] sysvec_call_function_single+0xb/0xc0 [ 2420.388533] softirqs last enabled at (1056): [] __irq_exit_rcu+0x11b/0x180 [ 2420.389765] softirqs last disabled at (1033): [] __irq_exit_rcu+0x11b/0x180 [ 2420.390988] ---[ end trace 0000000000000000 ]--- [ 2420.391719] ------------[ cut here ]------------ [ 2420.392387] WARNING: CPU: 0 PID: 82976 at kernel/events/core.c:2557 merge_sched_in+0xadb/0x1110 [ 2420.393634] Modules linked in: [ 2420.394113] CPU: 0 PID: 82976 Comm: syz-executor.2 Tainted: G W 6.0.0-rc5-next-20220914 #1 [ 2420.395477] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2420.397071] RIP: 0010:merge_sched_in+0xadb/0x1110 [ 2420.397784] Code: ff ff e8 78 16 ef ff 65 8b 05 ed 74 ab 7e 31 ff 89 c6 89 04 24 e8 15 13 ef ff 8b 04 24 85 c0 0f 84 13 02 00 00 e8 55 16 ef ff <0f> 0b e9 c4 fb ff ff e8 49 16 ef ff 4c 89 e8 48 05 18 01 00 00 e9 [ 2420.400362] RSP: 0000:ffff88806ce09cb0 EFLAGS: 00010046 [ 2420.401093] RAX: 0000000080010002 RBX: ffff88806ce3ef00 RCX: 0000000000000000 [ 2420.402105] RDX: ffff88803a690000 RSI: ffffffff815700eb RDI: 0000000000000005 [ 2420.403145] RBP: ffff88803aa4a2b0 R08: 0000000000000005 R09: 0000000000000001 [ 2420.404174] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88806ce3ef00 [ 2420.405202] R13: 0000000000000001 R14: ffff88803aa4a358 R15: ffff88803aa4a4d0 [ 2420.406232] FS: 00005555563a0400(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 2420.407373] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2420.408213] CR2: 00007fdb30c86f64 CR3: 0000000019f2c000 CR4: 0000000000350ef0 [ 2420.409232] Call Trace: [ 2420.409620] [ 2420.409989] visit_groups_merge.constprop.0.isra.0+0x4fc/0xef0 [ 2420.410864] ? merge_sched_in+0x1110/0x1110 [ 2420.411504] ? lock_is_held_type+0xd7/0x130 [ 2420.412170] ctx_sched_in+0x2e6/0x770 [ 2420.412726] ? lock_acquire+0x1b2/0x530 [ 2420.413276] ? visit_groups_merge.constprop.0.isra.0+0xef0/0xef0 [ 2420.414157] ? lock_is_held_type+0xd7/0x130 [ 2420.414828] perf_event_sched_in+0x75/0x80 [ 2420.415458] ctx_resched+0x1ce/0x390 [ 2420.416029] __perf_install_in_context+0x285/0x9c0 [ 2420.416765] ? ctx_resched+0x390/0x390 [ 2420.417349] remote_function+0x125/0x1b0 [ 2420.417978] __flush_smp_call_function_queue+0x1df/0x5a0 [ 2420.418778] ? perf_duration_warn+0x40/0x40 [ 2420.419435] __sysvec_call_function_single+0x92/0x3a0 [ 2420.420141] sysvec_call_function_single+0x89/0xc0 [ 2420.420870] [ 2420.421218] [ 2420.421572] asm_sysvec_call_function_single+0x16/0x20 [ 2420.422387] RIP: 0010:do_wp_page+0x618/0x2050 [ 2420.423078] Code: df 48 89 ca 48 c1 ea 03 0f b6 14 02 48 89 c8 83 e0 07 83 c0 03 38 d0 7c 0c 84 d2 74 08 48 89 cf e8 9d 22 0f 00 41 8b 44 24 34 03 00 00 00 89 c6 89 44 24 18 e8 38 b4 dc ff 8b 44 24 18 83 f8 [ 2420.425652] RSP: 0000:ffff88803ca17cb8 EFLAGS: 00000246 [ 2420.426455] RAX: 0000000000000003 RBX: 0000000000000000 RCX: ffffea0000cbb174 [ 2420.427508] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffea0000cbb174 [ 2420.428567] RBP: ffff88803ca17d88 R08: 0000000000000000 R09: ffffea0000cbb177 [ 2420.429535] R10: fffff9400019762e R11: 0000000000000001 R12: ffffea0000cbb140 [ 2420.430621] R13: ffff888039bb3410 R14: ffff88803ca17dd8 R15: ffff88803ca17db0 [ 2420.431705] ? do_wp_page+0x5e0/0x2050 [ 2420.432268] __handle_mm_fault+0x11eb/0x35e0 [ 2420.432943] ? lock_is_held_type+0xd7/0x130 [ 2420.433617] ? __pmd_alloc+0x690/0x690 [ 2420.434252] ? handle_mm_fault+0x6fd/0xa20 [ 2420.434909] handle_mm_fault+0x2e6/0xa20 [ 2420.435548] do_user_addr_fault+0x536/0x1300 [ 2420.436258] exc_page_fault+0x98/0x1a0 [ 2420.436887] asm_exc_page_fault+0x22/0x30 [ 2420.437539] RIP: 0033:0x7fdb30b1f742 [ 2420.438145] Code: 49 83 ff 10 0f 84 cf 00 00 00 49 69 c7 c0 00 00 00 80 7b f8 00 44 89 7c 24 70 48 8d 6b f4 48 89 5c 24 28 48 89 44 24 38 75 bc 43 f8 01 31 c0 b9 40 42 0f 00 ba 81 00 00 00 44 89 7b f4 48 89 [ 2420.440577] RSP: 002b:00007ffd2bdf5360 EFLAGS: 00010246 [ 2420.441293] RAX: 0000000000000000 RBX: 00007fdb30c86f6c RCX: 0000000000000000 [ 2420.442259] RDX: 00007ffd2bdf54b8 RSI: 0000000000000000 RDI: 00007ffd2bdf54e8 [ 2420.443213] RBP: 00007fdb30c86f60 R08: 0000000000000000 R09: 0000000000000000 [ 2420.444164] R10: 0000000000000008 R11: 0000000000000016 R12: 00007fdb30c8b330 [ 2420.445106] R13: 00007ffd2bdf5460 R14: 00007fdb30c86f60 R15: 0000000000000000 [ 2420.446050] [ 2420.446363] irq event stamp: 1518 [ 2420.446816] hardirqs last enabled at (1517): [] handle_mm_fault+0x6fd/0xa20 [ 2420.447933] hardirqs last disabled at (1518): [] sysvec_call_function_single+0xb/0xc0 [ 2420.449151] softirqs last enabled at (1056): [] __irq_exit_rcu+0x11b/0x180 [ 2420.450268] softirqs last disabled at (1033): [] __irq_exit_rcu+0x11b/0x180 [ 2420.451369] ---[ end trace 0000000000000000 ]--- 18:55:38 executing program 6: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)={{0x0, 0x49, 0x163, 0x6, 0x1ff, 0x2, 0x0, 0x3, 0x80, 0x1, 0x7, 0x1ff, 0x0, 0x1000000000000000, 0x7}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udplite6\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x683565eb, 0x80000}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xc1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x40800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0xa472, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x1f, 0x0, 0x2}, r1, 0x9, r1, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000200), 0xff, 0x200080) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000240)={r0}) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000001280)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) io_uring_setup(0x1a48, &(0x7f00000013c0)={0x0, 0xab66, 0x2, 0x0, 0x381}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001440)='autogroup\x00') mkdirat(r2, &(0x7f0000001580)='./file0\x00', 0x10) syz_mount_image$tmpfs(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0xff, 0x2, &(0x7f0000001780)=[{&(0x7f0000001640)="759eb3e0c1edec4304107f746a617d571c661dbc4cce603705c89f983f3f738364e35ac2912698229587cf84b100e23a99b0a7eccaa57c0e4cd049f06dfc4fa37ec833af69c0d4f62160302763ba17d91934d5cf7cef4d9f16a0a68404658a8ecfa670cb5aaf132b169f068143fa4df235f6ae635ef6d60fe3bde4403c90d7aa0d40edbacbc75fe84631ae77d878d55001ff355d0a043a5d648efa9fd2a69faa3e842e9917573b752b3af41ef1becbb1", 0xb0, 0x81}, {&(0x7f0000001700)="06e807242aefb3bc25b9d7ee61384def3ff71e63e29ac0d216cc53972bd815162a8b063cd74bf5b3f03e21c38595e77170e2b0a89bc6f266310df0e1a2", 0x3d, 0xeba}], 0x80001, &(0x7f00000017c0)={[{@gid}, {@gid}], [{@hash}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'net/udplite6\x00'}}]}) [ 2420.513794] loop0: detected capacity change from 0 to 14 [ 2420.528690] loop5: detected capacity change from 0 to 14 [ 2420.534703] loop6: detected capacity change from 0 to 14 VM DIAGNOSIS: 18:55:38 Registers: info registers vcpu 0 RAX=0000000000000064 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b24f1 RDI=ffffffff87641b60 RBP=ffffffff87641b20 RSP=ffff88806ce09618 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000064 R11=0000000000000001 R12=0000000000000064 R13=ffffffff87641b20 R14=0000000000000010 R15=ffffffff822b24e0 RIP=ffffffff822b2549 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 00005555563a0400 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fdb30c86f64 CR3=0000000019f2c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 7463656a6e695f31 313230385f7a7973 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000040000 RBX=1ffff110073fcf84 RCX=ffffc900023e5000 RDX=0000000000040000 RSI=ffffffff813bc113 RDI=0000000000000005 RBP=ffff888039fe7cc8 RSP=ffff888039fe7c00 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000001 R13=0000000000000000 R14=0000000000000000 R15=0000000000000200 RIP=ffffffff813bc115 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f1efc2cf700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f1efee69000 CR3=00000000382a4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f1efee407c0 00007f1efee407c8 YMM02=0000000000000000 0000000000000000 00007f1efee407e0 00007f1efee407c0 YMM03=0000000000000000 0000000000000000 00007f1efee407c8 00007f1efee407c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000