0000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:51:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r3, &(0x7f0000000080)='+', 0x1, 0x0) lseek(0xffffffffffffffff, 0x8, 0x0) openat(r3, &(0x7f0000000000)='./file1\x00', 0x2000, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:51:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2}) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:51:58 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1070.403891] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8440 comm=syz-executor.5 [ 1070.408202] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8438 comm=syz-executor.1 [ 1070.429990] loop2: detected capacity change from 0 to 16776704 [ 1070.458701] loop0: detected capacity change from 0 to 16776704 [ 1070.481141] loop1: detected capacity change from 0 to 16776704 [ 1070.489222] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1070.489222] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1070.489222] [ 1070.504001] loop5: detected capacity change from 0 to 16776704 [ 1070.513551] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1070.513551] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1070.513551] 23:51:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 23:51:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) r2 = syz_io_uring_complete(0x0) fcntl$dupfd(r0, 0x406, r2) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r3, r1, &(0x7f0000000000)=0x3ffc, 0x5) r4 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r4) 23:51:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x404142, 0x42) r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x2}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000080)='+', 0x1, 0x0) sendmmsg$unix(r2, &(0x7f0000000240)=[{{&(0x7f0000000080)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000140)="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", 0xfc}, {&(0x7f00000002c0)="637379af5a4f47ecb5c49270a123b27475744c851f5f8fb861fa410c60aa9c61f469bb489d5de6de6d2721ed06381860cec2e3b972178e694ff800a7a1b5c46454ccdf9999ac9850c66a68f3826e234baf6ce033b17e71939245a768fc588f9e", 0x60}, {&(0x7f0000000340)="dae71c301cc6fab5c796476281e0077419d509aedac65cc01f27da6fca7a9b9f896ad234cf81d669fd058261e02c93de0a904c5bf3c9eeeaf154a0e95f5b96bc20d3a79eb611f9dd7272924bdc2c6fce0aeec620801dc801b5f927b8986d9eb891e34c0d83cf74669daef54f50aa3ea89a768dbaa162d62fec058829bfa43995f30d862712d13bf0cae491b6cf0ff542e8c6646b8326970f1be5656053f2523b433cf4ff8375b810c86faafc712a9eef17b3f4f9c4ac72e5cf7716846d9547439d29309e0b72549b3a30245799b2774deecf2bc57d37622136abb471f087", 0xde}, {&(0x7f0000000440)="6de56a54d6ee5a2dc2f7fd4af823300800454508b44391d1172a9f1ff9a30b527711fba5eaaf8924e84e0a8dc35b498795d3661936dadac8d9287005e73bfbedaa214a57846cbf1f438095b736a3751355d5bdb76db26fef05181a1f53193141833d28bd42c8a0f547a2495acd7d339bb180f7f58c5579dd47d5fb6fe82beef3f9714a1f871d3becbb3721af26ba3c516d128c514c539c0b34537239a9bfd500d343520d99e1dd03f1b82bb1324fa4ed5c05a04e", 0xb4}, {&(0x7f0000000500)="9c33f5861193689fa7484c8c7dceabdfe7ecad3d85fa3fbf850c3d839039ff2ba341f18deea6d081caef4e6c7b35d6f6eb0875a861f9ebb8568059cee3f8469ec7376f5911cb55bf5cb5f7a28f74b12388c98552e158376ba55f75c986d904abb3dcfc5761be72d28a574731fbcc47b432f4c99e159446282ab206ca5d9f2cbbeacf85b0fff77ea3e7e57cb2d34157c8e100f2893ec8cbf46d04398a9a4f841461d507e4ea83163c0ebfee258422d6a6f25e2963c98b344de3bff5d0ba02ea319c4ed740d461ac581ab7e19cbdef421d1024aa57db775c44c3fca84c107b473d62c72b029c4ac644a723a1e10d28b550", 0xf0}], 0x5, &(0x7f0000000000)=[@cred={{0x1c}}], 0x20, 0x40804}}], 0x1, 0x40045) sendfile(r1, r0, 0x0, 0x7fd) [ 1070.550125] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1070.550515] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1070.550515] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1070.550515] [ 1070.578627] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1070.578627] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1070.578627] [ 1070.604244] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1070.678020] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1070.688910] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:51:59 executing program 2: syz_emit_ethernet(0xd2, &(0x7f0000000000)={@local, @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00 \x00', 0x9c, 0x11, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00', {[], {0x0, 0x4e22, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "b2e3b69053745e4b2706209831795b465394729efa262554ceca29ea3c544813", "bbe0482f17ad5f45b14965b3896d3ed352918d60f705b27b1b071b524d83b51085c0a8362678ab7a65b774b0850af5ec", "16b7e3c6affd2ea130d659f7c307006ffbab90d1e7fcf446075bad6d", {"2c9e00494fa05868f743f19aa80eac95", "46e2e1270bd38892aa09989cc92d3656"}}}}}}}}, 0x0) 23:51:59 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0x0, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:51:59 executing program 1: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1070.929520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8469 comm=syz-executor.0 [ 1070.929543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8467 comm=syz-executor.1 [ 1070.951798] loop1: detected capacity change from 0 to 16776704 [ 1070.962512] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1070.962512] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1070.962512] [ 1070.968868] loop0: detected capacity change from 0 to 16776704 [ 1070.979623] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1070.985030] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1070.985030] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1070.985030] [ 1071.008822] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:52:12 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) r2 = syz_io_uring_complete(0x0) fcntl$dupfd(r0, 0x406, r2) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r3, r1, &(0x7f0000000000)=0x3ffc, 0x5) r4 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r4) 23:52:12 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0x0, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:12 executing program 1: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) preadv(r3, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/94, 0x5e}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000140)=""/233, 0xe9}], 0x3, 0x7fff, 0x0) r5 = open_tree(r1, &(0x7f0000000240)='./file1\x00', 0x0) sendmsg$TIPC_NL_NET_SET(r5, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x74, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x60, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x74}}, 0x24004001) sendfile(r0, r1, 0x0, 0x100000001) 23:52:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2}) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:52:12 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 1084.278539] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8478 comm=syz-executor.0 [ 1084.289477] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8482 comm=syz-executor.5 [ 1084.292636] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8483 comm=syz-executor.1 [ 1084.298218] loop5: detected capacity change from 0 to 16776704 [ 1084.311524] loop0: detected capacity change from 0 to 16776704 [ 1084.316204] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1084.316204] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1084.316204] [ 1084.317913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8491 comm=syz-executor.2 [ 1084.334608] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1084.334608] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1084.334608] [ 1084.335179] loop1: detected capacity change from 0 to 16776704 [ 1084.358686] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:52:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) r2 = syz_io_uring_complete(0x0) fcntl$dupfd(r0, 0x406, r2) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r3, r1, &(0x7f0000000000)=0x3ffc, 0x5) r4 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r4) [ 1084.367651] loop2: detected capacity change from 0 to 16776704 23:52:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 1084.388022] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:52:12 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1084.413569] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1084.413569] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1084.413569] [ 1084.420554] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1084.420554] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1084.420554] [ 1084.474826] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:52:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = gettid() getpriority(0x1, r1) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x7fb) sendfile(r0, r2, 0x0, 0x100000001) [ 1084.480519] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 23:52:13 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1084.497228] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8512 comm=syz-executor.5 23:52:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:52:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 23:52:13 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0x0, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:13 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1084.558643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8516 comm=syz-executor.0 23:52:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 1084.585523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8521 comm=syz-executor.2 [ 1084.589791] loop2: detected capacity change from 0 to 16776704 [ 1084.602574] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1084.602574] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1084.602574] [ 1084.628224] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1084.644718] loop0: detected capacity change from 0 to 16776704 [ 1084.673382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8529 comm=syz-executor.1 [ 1084.675740] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1084.675740] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1084.675740] [ 1084.696223] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1084.717874] loop1: detected capacity change from 0 to 16776704 [ 1084.742932] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1084.742932] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1084.742932] [ 1084.767806] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1098.674577] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8541 comm=syz-executor.0 23:52:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) finit_module(r1, &(0x7f0000000080)='/proc/partitions\x00', 0x2) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x7fb) sendfile(r0, r2, 0x0, 0x100000001) 23:52:27 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:27 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:52:27 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 23:52:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:52:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 1098.690237] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8550 comm=syz-executor.5 [ 1098.703790] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8552 comm=syz-executor.1 [ 1098.723127] loop0: detected capacity change from 0 to 16776704 [ 1098.743220] loop1: detected capacity change from 0 to 16776704 [ 1098.750738] loop5: detected capacity change from 0 to 16776704 23:52:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 23:52:27 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1098.770857] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1098.770857] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1098.770857] [ 1098.806584] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1098.806584] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1098.806584] [ 1098.807080] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1098.814933] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1098.814933] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1098.814933] 23:52:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0xe, 0x1, @tid=r2}, &(0x7f0000000340)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x1, 0x81, 0x1d, 0x0, 0xd511, 0x1, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x7f, 0x1}, 0x40200, 0x3, 0x5, 0x2, 0x4, 0xffffff80, 0x1, 0x0, 0x8, 0x0, 0x7fffffff}, r2, 0x8, r3, 0x2) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:52:27 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1098.892907] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1098.898198] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8568 comm=syz-executor.2 [ 1098.913201] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1098.964915] loop2: detected capacity change from 0 to 16776704 [ 1099.016803] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8576 comm=syz-executor.5 23:52:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{0x0}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 23:52:27 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1099.073251] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8581 comm=syz-executor.1 [ 1099.089042] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1099.089042] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1099.089042] [ 1099.094234] loop5: detected capacity change from 0 to 16776704 23:52:27 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1099.127740] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8584 comm=syz-executor.0 [ 1099.148708] loop1: detected capacity change from 0 to 16776704 23:52:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x0, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1099.191665] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1099.191665] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1099.191665] [ 1099.196722] loop0: detected capacity change from 0 to 16776704 [ 1099.200639] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1099.200639] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1099.200639] [ 1099.208023] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 23:52:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file1\x00', 0x63e801, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) fallocate(r3, 0xb, 0x401, 0xfffffffffffeffff) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:52:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:52:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{0x0}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 1099.272769] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1099.272769] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1099.272769] [ 1099.276146] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1099.283759] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:52:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x0, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1099.366889] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:52:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:52:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x0, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:52:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x2, {0x7, './file1'}}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/sco\x00') ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) lseek(r3, 0xf30, 0x4) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:52:42 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:42 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{0x0}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 23:52:42 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1113.485868] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8613 comm=syz-executor.0 [ 1113.495189] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8615 comm=syz-executor.1 23:52:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x2, 0x8001) [ 1113.512193] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8620 comm=syz-executor.5 [ 1113.524561] loop1: detected capacity change from 0 to 16776704 [ 1113.559182] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1113.559182] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1113.559182] [ 1113.567698] loop0: detected capacity change from 0 to 16776704 [ 1113.594135] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1113.600524] loop5: detected capacity change from 0 to 16776704 [ 1113.605108] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1113.605108] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1113.605108] 23:52:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 1113.644690] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1113.664181] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1113.664181] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1113.664181] 23:52:42 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x155183, 0x10) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x1010, r0, 0x10000000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r3}, 0xffffffff) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r5, 0x4b63, 0x3) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r6, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) [ 1113.741985] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1113.792744] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8647 comm=syz-executor.1 23:52:42 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1113.866879] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8654 comm=syz-executor.0 23:52:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r3, r2, &(0x7f0000000000)=0x3ffc, 0x5) r4 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r4) 23:52:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) r2 = syz_io_uring_complete(0x0) fcntl$dupfd(r0, 0x406, r2) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r3, r1, &(0x7f0000000000)=0x3ffc, 0x5) r4 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r4) 23:52:56 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) preadv(r5, 0x0, 0x0, 0x2, 0x8001) 23:52:56 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 23:52:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000080)='+', 0x1, 0x0) r2 = openat(r1, &(0x7f0000000280)='/proc/self/exe\x00', 0x10200, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x7fb) sendfile(r0, r2, 0x0, 0x100000001) 23:52:56 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:52:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r3, r2, &(0x7f0000000000)=0x3ffc, 0x5) r4 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r4) 23:52:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(r0, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x402881, 0x0) r3 = syz_io_uring_setup(0x5e4e, &(0x7f0000000480), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000080)) io_uring_enter(r3, 0x58ab, 0x1, 0x0, 0x0, 0x0) r4 = openat(r0, &(0x7f0000000040)='./file1\x00', 0x12400, 0x1) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x3, 0x9, 0x9}) r5 = syz_io_uring_setup(0x5e4e, &(0x7f0000000480)={0x0, 0x0, 0x20}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000080)) io_uring_enter(r5, 0x58ab, 0x1, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) statx(r1, &(0x7f0000000140)='./file1\x00', 0x4000, 0x40, &(0x7f00000002c0)) [ 1128.021362] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8658 comm=syz-executor.5 [ 1128.023055] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8667 comm=syz-executor.1 [ 1128.032663] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8669 comm=syz-executor.0 [ 1128.049473] loop0: detected capacity change from 0 to 16776704 [ 1128.065773] loop5: detected capacity change from 0 to 16776704 [ 1128.107956] loop1: detected capacity change from 0 to 16776704 [ 1128.114487] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1128.114487] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1128.114487] [ 1128.119113] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1128.119113] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1128.119113] [ 1128.122641] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1128.122641] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1128.122641] [ 1128.160141] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1128.162478] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1128.164732] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:53:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) preadv(r5, 0x0, 0x0, 0x2, 0x8001) 23:53:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r3, r2, &(0x7f0000000000)=0x3ffc, 0x5) r4 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r4) 23:53:09 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1141.341116] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8696 comm=syz-executor.1 23:53:09 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 23:53:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) sendfile(r0, r1, &(0x7f00000001c0)=0x1a7a, 0x4) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) getsockname(r4, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r6, r3, 0x0, 0x7fb) sendfile(r0, r3, 0x0, 0x100000001) preadv(r6, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/75, 0x4b}, {&(0x7f00000002c0)=""/253, 0xfd}], 0x2, 0x9, 0x8001) 23:53:09 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:09 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1141.365130] loop1: detected capacity change from 0 to 16776704 [ 1141.366678] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8704 comm=syz-executor.0 [ 1141.374056] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1141.374056] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1141.374056] 23:53:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 1141.383946] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8706 comm=syz-executor.5 [ 1141.404163] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8707 comm=syz-executor.2 [ 1141.410209] loop0: detected capacity change from 0 to 16776704 [ 1141.412700] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1141.433897] loop5: detected capacity change from 0 to 16776704 [ 1141.441901] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1141.441901] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1141.441901] 23:53:09 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1141.449471] loop2: detected capacity change from 0 to 16776704 23:53:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 1141.475654] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1141.475654] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1141.475654] [ 1141.478465] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1141.478465] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1141.478465] [ 1141.507212] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1141.523600] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8723 comm=syz-executor.1 [ 1141.540977] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1141.570606] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1141.574142] loop1: detected capacity change from 0 to 16776704 23:53:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:53:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) preadv(r5, 0x0, 0x0, 0x2, 0x8001) 23:53:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(0x0, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:53:10 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1141.639717] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1141.639717] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1141.639717] 23:53:10 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat(r0, &(0x7f0000000080)='./file1/file0\x00', 0x224680, 0x81) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) open(&(0x7f0000000040)='./file1\x00', 0x0, 0x1) 23:53:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 1141.687650] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:53:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(0x0, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1141.722819] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8740 comm=syz-executor.2 23:53:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) [ 1141.763099] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8744 comm=syz-executor.0 23:53:10 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1141.782089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8749 comm=syz-executor.5 [ 1141.788771] loop2: detected capacity change from 0 to 16776704 23:53:10 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1141.813033] loop5: detected capacity change from 0 to 16776704 [ 1141.818203] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1141.818203] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1141.818203] [ 1141.821837] loop0: detected capacity change from 0 to 16776704 [ 1141.848422] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1141.848422] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1141.848422] 23:53:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file1\x00', 0x109700, 0x88) r2 = socket$nl_generic(0x10, 0x3, 0x10) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x18c82e99454496e6, 0x810, 0xffffffffffffffff, 0x10000000) sendfile(r2, r1, 0x0, 0x7fb) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) sendfile(r2, r3, &(0x7f0000001800)=0x3, 0x5) r5 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000001840), 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000001880)={{0x1, 0x1, 0x18, r5}, './file1\x00'}) sendfile(r0, r1, 0x0, 0x100000001) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r7, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r6, 0xc400941d, &(0x7f0000002700)={0x0, 0xfff, 0x5, 0x1}) readv(r2, &(0x7f0000002380)=[{&(0x7f0000000040)=""/160, 0xa0}, {&(0x7f0000001c40)=""/33, 0x21}], 0x2) recvmmsg$unix(r1, &(0x7f0000002140)=[{{&(0x7f0000000140)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/208, 0xd0}, {&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f00000003c0)=""/122, 0x7a}, {&(0x7f0000000440)=""/40, 0x28}, {&(0x7f0000000480)=""/185, 0xb9}, {&(0x7f0000000540)=""/99, 0x63}], 0x6, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f00000006c0), 0x6e, &(0x7f00000017c0)=[{&(0x7f0000000740)=""/122, 0x7a}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, &(0x7f0000002540)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="2aa62e309889ee0b3fc46b2010fc4bd3c4ce8011692cc8d543ec480d14f61e1df13f3cecaaf717eaf3cb66a92590b1a2d5ce7f88d781b4ce6ca420dfd0c93af95d3311b0de527a1e5305e3a7190235d2c1541a314da3ae1dd11367f3600890c036223fbd4a8d9e0cbc1b4374aed2a3aa68c968e26d5519b336fb306475f715e2419d8bb714f6d3cd41889d667260342552a22915b9193cb98f7b087e5f49bf4b3057e006db7da6e6c9d015aad675a8d200a47a851d64be39f7ddfcbcf8e38b627b5e114d3625dd", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xe0}}, {{&(0x7f0000001900), 0x6e, &(0x7f0000001d00)=[{&(0x7f0000001980)=""/87, 0x57}, {&(0x7f0000001a00)=""/232, 0xe8}, {&(0x7f0000001b00)=""/252, 0xfc}, {&(0x7f0000001c00)=""/6, 0x6}, {&(0x7f0000001c40)}, {&(0x7f0000001c80)=""/31, 0x1f}, {&(0x7f0000001cc0)=""/6, 0x6}], 0x7, &(0x7f0000001d80)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000001dc0), 0x6e, &(0x7f0000002000)=[{&(0x7f0000001e40)=""/62, 0x3e}, {&(0x7f00000023c0)=""/80, 0x50}, {&(0x7f0000001f00)=""/46, 0x2e}, {&(0x7f0000001f40)=""/174, 0xae}], 0x4, &(0x7f0000002440)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x100}}], 0x4, 0x40010000, 0x0) sendmsg$nl_generic(r8, &(0x7f0000002340)={&(0x7f0000002240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002300)={&(0x7f0000002280)={0x68, 0x38, 0x800, 0x70bd25, 0x25dfdbff, {0xb}, [@generic="453255683b97a20ba23dd19ff2d016e9c441d1a9d088b791c88e5fc88687ee991f09c34bdf174659ef0b7208c1752e98018b253cc0e4800f81a1c5f31add1ebf17f5450b15fedc8f72cce996d2ce1713ac93"]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4040000) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) [ 1141.860910] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8760 comm=syz-executor.1 [ 1141.860975] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1141.885749] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1141.896708] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1141.896708] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1141.896708] [ 1141.914995] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 23:53:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) [ 1141.944230] loop1: detected capacity change from 0 to 16776704 23:53:10 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(0x0, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:53:10 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1141.993176] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1141.993176] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1141.993176] [ 1142.008893] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8771 comm=syz-executor.5 [ 1142.037883] loop5: detected capacity change from 0 to 16776704 [ 1142.055153] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1142.064500] loop0: detected capacity change from 0 to 16776704 [ 1142.072461] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1142.072461] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1142.072461] [ 1142.079646] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1142.081920] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1142.081920] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1142.081920] [ 1142.102600] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:53:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r3, 0xffffffff, 0x8, 0x5, 0x3}) sendfile(r0, r1, 0x0, 0x100000001) 23:53:24 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) preadv(r5, &(0x7f0000000340), 0x0, 0x0, 0x8001) 23:53:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 23:53:24 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:53:24 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:24 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:24 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1156.357133] selinux_netlink_send: 1 callbacks suppressed [ 1156.357151] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8796 comm=syz-executor.5 [ 1156.359858] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8795 comm=syz-executor.0 [ 1156.362456] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8797 comm=syz-executor.1 [ 1156.371467] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8800 comm=syz-executor.2 [ 1156.397016] loop5: detected capacity change from 0 to 16776704 [ 1156.422024] loop2: detected capacity change from 0 to 16776704 [ 1156.429605] loop1: detected capacity change from 0 to 16776704 [ 1156.451782] loop0: detected capacity change from 0 to 16776704 [ 1156.481752] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1156.481752] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1156.481752] [ 1156.489766] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1156.489766] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1156.489766] [ 1156.496882] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1156.496882] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1156.496882] [ 1156.515555] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1156.515555] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1156.515555] [ 1156.563831] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1156.565576] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1156.570908] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1156.580135] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:53:37 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) preadv(r5, &(0x7f0000000340), 0x0, 0x0, 0x8001) 23:53:37 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1169.376177] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8824 comm=syz-executor.0 [ 1169.384801] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8828 comm=syz-executor.5 [ 1169.405150] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8834 comm=syz-executor.2 [ 1169.424548] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8833 comm=syz-executor.1 23:53:37 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x4f00000000, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000380)=""/168) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r2, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:53:37 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000036185b853d905317a77b0dc4bdeb3936aca6d74f4d9a25f67d507915cf22d552eee07e2da6edd05e23c56ff651f78a8c684a7975431f98dbf81005bdf145b979471a1f788708c9865cf258a0547317921e3b3520dc3ecf170e1845a54ee2775ec7a0001144e4670482108a89c2782c40a34a74bf610d10dbf79da64295fda7622e7a8ab245e831fb463434596e246feb64b0e686c96", @ANYRES16=r2, @ANYBLOB="010000000000000000000c00000004000280"], 0x18}}, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000000000)={0x1, 0x88, 0x6}) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept4(r1, &(0x7f0000000140)=@ethernet={0x0, @remote}, &(0x7f0000000040)=0x80, 0x80800) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r3, 0x89f5, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x4, 0x7, 0x20, 0x3, 0x23, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8, 0x20, 0x1, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'syztnl1\x00', r6, 0x2f, 0x7, 0xec, 0x8001, 0x32, @private0={0xfc, 0x0, '\x00', 0x1}, @loopback, 0x8, 0x740, 0x2}}) sendfile(r4, r3, 0x0, 0x7fb) sendfile(r0, r3, 0x0, 0x100000001) [ 1169.432135] loop0: detected capacity change from 0 to 16776704 [ 1169.443647] loop5: detected capacity change from 0 to 16776704 [ 1169.462110] loop2: detected capacity change from 0 to 16776704 [ 1169.479568] loop1: detected capacity change from 0 to 16776704 [ 1169.488036] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1169.488036] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1169.488036] [ 1169.489549] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1169.489549] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1169.489549] [ 1169.495031] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1169.495031] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1169.495031] [ 1169.504803] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:53:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x11c, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0xd}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0xd}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0xd}, {0x5, 0x83, 0x1}}]}, 0x11c}, 0x1, 0x0, 0x0, 0x40004}, 0x8080) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:53:38 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x4f00000000, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000380)=""/168) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r2, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1169.558077] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1169.558077] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1169.558077] [ 1169.585000] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1169.588885] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1169.601489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8851 comm=syz-executor.5 [ 1169.625733] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1169.657744] loop5: detected capacity change from 0 to 16776704 [ 1169.692916] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1169.692916] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1169.692916] [ 1169.701416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8856 comm=syz-executor.0 23:53:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:53:38 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:38 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1169.720934] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1169.740042] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8862 comm=syz-executor.2 [ 1169.743902] loop0: detected capacity change from 0 to 16776704 [ 1169.747636] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8864 comm=syz-executor.1 [ 1169.752765] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1169.752765] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1169.752765] 23:53:38 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1169.769758] loop2: detected capacity change from 0 to 16776704 [ 1169.770609] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1169.779241] loop1: detected capacity change from 0 to 16776704 [ 1169.796923] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1169.796923] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1169.796923] [ 1169.800761] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1169.800761] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1169.800761] 23:53:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) preadv(r5, &(0x7f0000000340), 0x0, 0x0, 0x8001) 23:53:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) [ 1169.834727] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1169.873044] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:53:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 1169.912126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8878 comm=syz-executor.5 23:53:38 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x4f00000000, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000380)=""/168) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r2, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, 0x0, 0x20000044) syz_80211_inject_frame(&(0x7f0000000300)=@device_b, &(0x7f0000000380)=@mgmt_frame=@assoc_req={@with_ht={{{}, {0x1}, @device_b, @device_a, @random="400f7f250b44", {0x3, 0x1}}}, 0x0, 0x0, {}, @val={0x1, 0x2, [{}, {0x24}]}, @val={0x2d, 0x1a, {0x0, 0x0, 0x0, 0x0, {0x2, 0x40, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8, 0x5, 0x20}}}, 0x42) syz_80211_inject_frame(&(0x7f0000000000)=@device_b, &(0x7f0000000040)=@ctrl_frame=@cf_end={{}, {0x2731}, @broadcast, @random="44bc3420c4c2"}, 0x10) nanosleep(0x0, 0x0) rt_sigtimedwait(&(0x7f0000000180)={[0x401]}, &(0x7f00000001c0), &(0x7f0000000240)={0x77359400}, 0x8) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x70}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040011}, 0x40) socket$packet(0x11, 0x3, 0x300) [ 1169.982081] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1169.993777] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1171.116463] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 23:53:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1186.302239] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8900 comm=syz-executor.5 [ 1186.302631] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8903 comm=syz-executor.0 [ 1186.311612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8902 comm=syz-executor.1 23:53:54 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:54 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(r1, &(0x7f00000000c0)='./file1\x00', 0x101201, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000840)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000c80)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6afea83dce8f6a9c36adbbf7c23348ed7953cfd897913c1f6e530c124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e579e46004fbfb9ae99572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c001100000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044fab0a3ee36278183e00f05d56ee58c70cc78f1fe11e55c898d61e09dd9ec4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb39d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7f009947c9213bca5dc0b85ccc521acda794895462c77f5ff370f89a2e870f5d485e58951dd7d1e27236dc52ce2c5ad9c73e0a61401a4a516c41604d7981f0c5d28db9d69e06008070a1c8a29ab4b046f86a311abc00000000000000000000000021d58c77edb293cc9578f585bdd701f9ee2106436f5fcf55fe6240095b6b3d472798f8f9275542afa54cb35bead6ff06f9faacfe22aecf3a338b66d6b6d7493b8154647492b7504ee04560f3f09be3740b31fc8e83b0d8d71b009490cc8c05463d87a3dc636dd21e096d9d81c6d82e6476e7d92eac37b40eabf6c87bcf97f4e8375843edc446a639842cc11c20d6cbc305948014b499ce164cd61e37a219f9e9d6192530a1e19508041dee4e6388131d075a48f73d985675042259c55328516aa0d7714a86cb42c54b353075a75bd6c97f07e67799bb3c4acdf717de323a07b094965969ea17dedd4e913cc697ce6454df791c397f653bc1d2408fe440060c11d098bba54b0d10a129c468dc1c556c6554994e3f2993f60563fbb3017e10130ba23b7a165e98be854f41773afda6d73adb0f00d1a977cbdb5c3cb7e008bf15b1feb75397420f0df622573b78076504d38822a800000000000000fe9b13010e182ad77a6d7186202d8177d60129be4d487ab48759eabcb23ff4fc1a149c01dff17dca8148be0262812a277768d75a4d43d5a68c3de30bcfaa3c084af876fd561231a0b0e045a39f1668b2936b6bbcbd724ec98fd9c5d833b85a0b6914162a02e2b3bc7a691c589ee0adac135ace3a3eacb0ce207ba0d8b1d6d7e8e3521d1ce6049f2ebda21a093b11220a98ba572e7b20f96cfc31c209a2d15fc29401ca2ca5ee340e9106b5797ce81742ea6836c8d0cd5303d11af4795cd953b428d630b27471f983fd78887aed2f03eba58776eae7599afd9ca687faf02ef6e805d349950554086d73961e6ac3e6cbdcb5573d08cad3cd21d59a081fe5aa03e7fb772a48e0fa349ba844d84e665f7ffb8c460db950132b561d79ab33cb09d7290d9ad5ae1c90835861756e88e41ea2bee93130a6b8fe12009b84eb210a874373e15ecda9a4dc65aec5a47d0c6f20675f1058a4b1afd437db7495a4f71a5748d3538b8c153f7ea4dfb64e285c0a063f5fe62a217f3bd8b83ba3fc104f067767b39591f4c8232bf2a33082c2903ae4682afdafb2eafe1b3b7d2f681bc09ccf50d722aeedc7aa234fb3fa12b6bcf27330bf830fe6467123862c110437403108477c13267c9a34daf12411419239cd83e8c4d5694e6a42c170d3153f3043e1e79c03c6a7c4fb6cd600ef6ccb3b19a8038d526cbe7520d7c3c2821023a24676ed9df1a76d2c6784accbff342929b25b0b8eefa4e5edc394a531d6d3ee55934694fcf034d80212d6e9553d056080a9ac66c0efc3383346befd313f8a8b521fbf1b1585952c25332c78c36360aef4918eb394a415dd4f882b51f7a733856f4ccc55eae00c77dfe57da9ebde276cb8d7326c4d490c8ddc1ebf6f03e9df88c64c3f5274c5c366a84f64dd747910f8eb6f9cd59b41e06586cc10ab937275cfbb5c4343183b5533983d6d74000a94edecacc88f7d94edee9f6480cf80aa90848873600f41e5455382a77a623f8d0e7e0ea272ba12ec67cf6edb65f1dfbdc099424b5ab8000000000000"], 0x98}}, 0x0) close_range(r4, r3, 0x0) pread64(r3, &(0x7f0000000200)=""/78, 0x4e, 0x98ce) ioctl$SG_IO(0xffffffffffffffff, 0x2201, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000180)='./file0\x00', 0x2, 0x140, 0x31713}, 0x1f7) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40086607, &(0x7f0000000080)) 23:53:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r3, @ANYBLOB="010027bd7000ffdbdf25040000003c00028005000d000000000006000e004e22000006000b000a0000000800040001000000080008000100008006000e004e210000060002004e21000008000500ee0400001c000280080004000600000006000e004e22000005000d000000000008000600599e00003c00018008000b0073697000080008000300000014000300000000000000000000000000000000000c0007001400000005000002080006006f766600"], 0xb8}, 0x1, 0x0, 0x0, 0x4}, 0x20004801) sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, r3, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7ff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x78}, 0x1, 0x0, 0x0, 0x8040}, 0x800) sendfile(r0, r1, 0x0, 0x100000001) 23:53:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2) 23:53:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x0) 23:53:54 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:54 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x4f00000000, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000380)=""/168) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r2, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1186.343188] loop5: detected capacity change from 0 to 16776704 [ 1186.361209] loop1: detected capacity change from 0 to 16776704 [ 1186.364937] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 23:53:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x3) [ 1186.389784] loop0: detected capacity change from 0 to 16776704 [ 1186.402977] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1186.402977] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1186.402977] [ 1186.418923] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1186.418923] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1186.418923] [ 1186.458756] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1186.458756] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1186.458756] 23:53:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x2}}, './file1\x00'}) r2 = openat(r1, &(0x7f0000000280)='/proc/self/exe\x00', 0x8000, 0x16) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x7fb) sendfile(r0, r2, 0x0, 0x100000001) [ 1186.477650] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:53:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1186.490084] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1186.492009] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:53:55 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x4f00000000, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000380)=""/168) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r2, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1186.590027] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1186.625314] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8928 comm=syz-executor.0 23:53:55 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1186.671819] loop0: detected capacity change from 0 to 16776704 23:53:55 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x4f00000000, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000380)=""/168) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:53:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4) [ 1186.727641] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1186.727641] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1186.727641] [ 1186.778244] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1186.801136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8939 comm=syz-executor.1 [ 1186.809647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8937 comm=syz-executor.5 [ 1186.854202] loop5: detected capacity change from 0 to 16776704 [ 1186.887659] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1186.887659] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1186.887659] [ 1186.925027] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:54:08 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x80}}, './file1\x00'}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) 23:54:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x0) [ 1199.548834] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8956 comm=syz-executor.0 23:54:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000290000000f000000000000000200000002000000008000000080000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000014900)=ANY=[]) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r0, &(0x7f0000000080)='+', 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000001500)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001480)='./file1\x00', &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0xee01, r3}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001540)={{0x1, 0x1, 0x18, r1, {0x0, r3}}, './file0\x00'}) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xff, 0x6, &(0x7f0000001400)=[{&(0x7f0000000240)="e6c3dfe414faebc0a71c6783ab3125c3dbd3a77593e394c28afafd27a2dffe933a101c498db218d6d7784d4688cdaf29e647a2d98e46005a9149c69fe725f4687a406cbac1a429e1a9ca82e558ded2fe6d038f1f1818585e8502d93918f9e907350bc66f25305b4fef7e13d0f950e35b99b1da4d063a90e486bb3558ba464eeb75f1e0b79aa2e9ecb4d5a1e98237bdd9395efc8429c8c908967987305b0df7a329d6da1aa8b12ebb01421c57c7c02506fd9ad2c6e0992282dcd41291e3ef6d480c48e22bd7c6f15f9369de92957bcee60b6e79119f299ed57ae4fea398184a3d9aecc7004980fe8955603640e61ac305bc", 0xf1, 0x81}, {&(0x7f00000000c0)="506067ad7558bfeb3429b67148b4b438ab73779227b04e046f5b709941d800c86a20065c", 0x24}, {&(0x7f0000000140)="fdab958056424a7d0ee159e82b9d7afc0c5ec378b0659e26ed2b45e7612b4d9317dea542bf9f8a35ffa7b52ec170581fc9feca3bbbef7c654e614bc3afb1485b7f794da35a87a889dcfc37d1465c99226f920faacdde452bd0aba3f6ff92cf407522d2f57a96987b836fd3944b069fc17cc082f6a85a6b699ce85de08c40531a1ccc81b0d1ec74bab0ee6e343dc1a8d6a8d03b1151d3ced7910304205d1cf658fc29733487800603891d4085", 0xac, 0x7}, {&(0x7f0000000340)="5d0ea3f67568abcb329c23aae025901d8facf37796ee4dd41d101b50380fe7b5c8199663f6c2c8c14ced43dd2301ea", 0x2f, 0xdb}, {&(0x7f0000000380)="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", 0x1000, 0x3}, {&(0x7f0000001380)="bdf6e3d05c91c18d601450d979ff2e92fba086ab0241c89370c9fa4ec7b0ca51114f3fe171e941594f7d01def991ec079b00d940823d40f318e5771f0c8490e888f38655a74903151189d659e7afc2556265d576998f7abb879ce78360c4", 0x5e, 0x8}], 0x8c0013, &(0x7f00000014c0)={[{@shortname_lower}], [{@dont_measure}, {@fowner_eq}]}) 23:54:08 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x4f00000000, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000380)=""/168) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r2, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1199.563234] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8952 comm=syz-executor.5 [ 1199.572500] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8963 comm=syz-executor.1 [ 1199.572957] loop0: detected capacity change from 0 to 16776704 [ 1199.593158] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1199.593158] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1199.593158] 23:54:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:54:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x5) 23:54:08 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x4f00000000, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000380)=""/168) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1199.619658] loop1: detected capacity change from 0 to 16776704 23:54:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000004300000008000300", @ANYRES32=r5, @ANYBLOB="0c00580000000006"], 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r4, 0x20, 0x70bd2d, 0x25dfdbff, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x7f246554, 0x2a}}}}, ["", ""]}, 0x28}}, 0x2004c800) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) [ 1199.623440] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1199.638803] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1199.638803] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1199.638803] [ 1199.650631] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1199.653514] loop5: detected capacity change from 0 to 16776704 [ 1199.674509] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1199.674509] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1199.674509] 23:54:08 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1199.688932] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:54:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6) 23:54:08 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x4f00000000, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000380)=""/168) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1199.793019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8987 comm=syz-executor.0 23:54:08 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:54:08 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1199.864571] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8992 comm=syz-executor.2 [ 1199.886452] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8994 comm=syz-executor.1 23:54:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:54:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7) [ 1199.913580] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=8997 comm=syz-executor.5 [ 1199.931912] loop1: detected capacity change from 0 to 16776704 [ 1199.937946] loop5: detected capacity change from 0 to 16776704 [ 1199.971744] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1199.971744] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1199.971744] [ 1199.974976] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1199.974976] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1199.974976] [ 1200.009951] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1200.013922] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:54:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x8) fallocate(0xffffffffffffffff, 0x2c, 0x4, 0x9) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) 23:54:20 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:20 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1212.459600] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9020 comm=syz-executor.5 [ 1212.463596] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9019 comm=syz-executor.0 [ 1212.477558] loop0: detected capacity change from 0 to 16776704 [ 1212.489908] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9030 comm=syz-executor.2 [ 1212.494305] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9028 comm=syz-executor.1 23:54:20 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x0) 23:54:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8) 23:54:20 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1212.502919] loop5: detected capacity change from 0 to 16776704 [ 1212.512524] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1212.512524] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1212.512524] [ 1212.528088] loop1: detected capacity change from 0 to 16776704 [ 1212.538105] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1212.538105] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1212.538105] [ 1212.545791] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1212.545791] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1212.545791] [ 1212.573059] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1212.580907] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:54:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x7) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) 23:54:21 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1212.637031] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:54:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x9) 23:54:21 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xb) 23:54:21 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1212.755114] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9048 comm=syz-executor.1 [ 1212.781088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9050 comm=syz-executor.2 [ 1212.795477] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9053 comm=syz-executor.0 [ 1212.800078] loop1: detected capacity change from 0 to 16776704 [ 1212.874956] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1212.874956] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1212.874956] [ 1212.917983] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:54:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x145142, 0x84) r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000080)='+', 0x1, 0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/102, 0x66}, {&(0x7f00000001c0)=""/144, 0x90}], 0x2, 0xffffd474, 0x3) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000000)) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r0, 0x0, 0x7fb) 23:54:34 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10) 23:54:34 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:54:34 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:34 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x4f00000000, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000380)=""/168) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:34 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4) [ 1225.836595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9067 comm=syz-executor.0 [ 1225.846034] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9078 comm=syz-executor.2 [ 1225.854957] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9076 comm=syz-executor.5 [ 1225.861400] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9079 comm=syz-executor.1 23:54:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 1) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:54:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000000)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) signalfd(r3, &(0x7f0000000040)={[0x1]}, 0x8) [ 1225.875731] loop0: detected capacity change from 0 to 16776704 23:54:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf0) [ 1225.890641] loop5: detected capacity change from 0 to 16776704 [ 1225.898996] loop1: detected capacity change from 0 to 16776704 23:54:34 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1225.920814] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1225.920814] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1225.920814] [ 1225.924535] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1225.924535] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1225.924535] [ 1225.931455] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1225.931455] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1225.931455] 23:54:34 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x4f00000000, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000380)=""/168) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1225.950132] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1225.950640] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1225.975614] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1225.984065] FAULT_INJECTION: forcing a failure. [ 1225.984065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1225.987225] CPU: 1 PID: 9096 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1225.988717] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1225.990508] Call Trace: [ 1225.991060] dump_stack+0x107/0x167 [ 1225.991868] should_fail.cold+0x5/0xa [ 1225.992831] _copy_from_user+0x2e/0x1b0 [ 1225.993840] __ext4_ioctl+0x2780/0x4220 [ 1225.994831] ? ext4_reset_inode_seed+0x450/0x450 [ 1225.996076] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1225.997491] ? find_held_lock+0x2c/0x110 [ 1225.998556] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1225.999917] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1226.001019] ? do_vfs_ioctl+0x283/0x10d0 [ 1226.001550] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9100 comm=syz-executor.2 [ 1226.001863] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1226.001884] ? generic_block_fiemap+0x60/0x60 [ 1226.005535] ? lock_downgrade+0x6d0/0x6d0 [ 1226.006645] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1226.007888] ? wait_for_completion_io+0x270/0x270 [ 1226.009122] ? selinux_file_ioctl+0xb6/0x270 [ 1226.010072] ? __ext4_ioctl+0x4220/0x4220 [ 1226.011073] __x64_sys_ioctl+0x19a/0x210 [ 1226.011935] do_syscall_64+0x33/0x40 [ 1226.012838] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1226.014182] RIP: 0033:0x7fa3bc6a6b19 [ 1226.015179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1226.019334] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1226.020945] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1226.022460] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1226.023965] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1226.025487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1226.027368] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 23:54:34 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1226.107792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9105 comm=syz-executor.5 [ 1226.164189] loop5: detected capacity change from 0 to 16776704 [ 1226.179991] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1226.179991] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1226.179991] [ 1226.199998] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:54:46 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x4f00000000, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000380)=""/168) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:46 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1238.366125] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9116 comm=syz-executor.0 [ 1238.380923] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9122 comm=syz-executor.5 23:54:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2f0) 23:54:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) lseek(0xffffffffffffffff, 0x8, 0x3) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:54:46 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:54:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 2) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:54:46 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1238.402790] loop5: detected capacity change from 0 to 16776704 [ 1238.417127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9129 comm=syz-executor.2 [ 1238.426565] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9130 comm=syz-executor.1 [ 1238.444987] FAULT_INJECTION: forcing a failure. [ 1238.444987] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.446739] CPU: 0 PID: 9136 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1238.447552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1238.448556] Call Trace: [ 1238.448874] dump_stack+0x107/0x167 [ 1238.449305] should_fail.cold+0x5/0xa [ 1238.449768] ? ext4_find_extent+0xa77/0xd70 [ 1238.450282] should_failslab+0x5/0x20 [ 1238.450735] __kmalloc+0x72/0x390 [ 1238.451147] ext4_find_extent+0xa77/0xd70 [ 1238.451645] ext4_move_extents+0xb51/0x3050 [ 1238.452170] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1238.452805] ? lock_acquire+0x197/0x470 [ 1238.453276] ? find_held_lock+0x2c/0x110 [ 1238.453754] ? lock_acquire+0x197/0x470 [ 1238.454218] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1238.454834] ? lock_release+0x680/0x680 [ 1238.455321] __ext4_ioctl+0x3048/0x4220 [ 1238.455800] ? ext4_reset_inode_seed+0x450/0x450 [ 1238.456363] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1238.456984] ? find_held_lock+0x2c/0x110 [ 1238.457476] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1238.458153] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1238.458764] ? do_vfs_ioctl+0x283/0x10d0 [ 1238.459247] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1238.459867] ? generic_block_fiemap+0x60/0x60 [ 1238.460395] ? lock_downgrade+0x6d0/0x6d0 [ 1238.460895] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1238.461470] ? wait_for_completion_io+0x270/0x270 [ 1238.462046] ? selinux_file_ioctl+0xb6/0x270 [ 1238.462567] ? __ext4_ioctl+0x4220/0x4220 [ 1238.463055] __x64_sys_ioctl+0x19a/0x210 [ 1238.463538] do_syscall_64+0x33/0x40 [ 1238.463979] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1238.464585] RIP: 0033:0x7fa3bc6a6b19 [ 1238.465027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1238.467183] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1238.468084] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1238.468941] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1238.469784] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1238.470618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1238.471457] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1238.475507] loop0: detected capacity change from 0 to 16776704 [ 1238.480445] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1238.480445] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1238.480445] 23:54:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r0, 0x0, 0x7fb) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x240840, 0x0) sendfile(r1, r1, 0x0, 0x100000001) [ 1238.517886] loop1: detected capacity change from 0 to 16776704 [ 1238.522168] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1238.522168] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1238.522168] 23:54:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x300) [ 1238.549464] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1238.549464] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1238.549464] 23:54:47 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1238.583502] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1238.585985] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1238.619864] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1238.669027] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9155 comm=syz-executor.2 23:54:47 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:54:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1498c0, 0x88) sendfile(r0, r1, 0x0, 0x100000001) [ 1238.734046] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9158 comm=syz-executor.0 23:54:47 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1238.829244] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9163 comm=syz-executor.5 [ 1238.857050] loop5: detected capacity change from 0 to 16776704 [ 1238.867494] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1238.867494] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1238.867494] [ 1238.879570] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1253.446136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9169 comm=syz-executor.5 23:55:01 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:01 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:55:01 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:01 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1253.476504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9174 comm=syz-executor.1 23:55:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x321) 23:55:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 3) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:55:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x404080, 0x8, 0x12}, 0x18) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) r3 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) [ 1253.497435] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9181 comm=syz-executor.2 [ 1253.505554] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9180 comm=syz-executor.0 [ 1253.506053] loop5: detected capacity change from 0 to 16776704 [ 1253.538140] loop1: detected capacity change from 0 to 16776704 23:55:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1253.579673] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1253.579673] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1253.579673] [ 1253.589599] FAULT_INJECTION: forcing a failure. [ 1253.589599] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.592279] CPU: 0 PID: 9189 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1253.593963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1253.595726] Call Trace: [ 1253.596366] dump_stack+0x107/0x167 [ 1253.597154] should_fail.cold+0x5/0xa [ 1253.597946] ? create_object.isra.0+0x3a/0xa30 [ 1253.598880] loop0: detected capacity change from 0 to 16776704 [ 1253.600175] should_failslab+0x5/0x20 [ 1253.600983] kmem_cache_alloc+0x5b/0x310 [ 1253.601856] ? lock_release+0x680/0x680 [ 1253.602682] create_object.isra.0+0x3a/0xa30 [ 1253.603588] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1253.604704] __kmalloc+0x16e/0x390 [ 1253.605520] ext4_find_extent+0xa77/0xd70 [ 1253.606378] ? ext4_move_extents+0x491/0x3050 [ 1253.607313] ext4_move_extents+0xb51/0x3050 [ 1253.608229] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1253.609328] ? lock_acquire+0x197/0x470 [ 1253.610136] ? find_held_lock+0x2c/0x110 [ 1253.610973] ? lock_acquire+0x197/0x470 [ 1253.611783] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1253.612979] ? lock_release+0x680/0x680 [ 1253.613870] __ext4_ioctl+0x3048/0x4220 [ 1253.614697] ? ext4_reset_inode_seed+0x450/0x450 [ 1253.615128] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1253.615128] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1253.615128] [ 1253.615722] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1253.615819] ? find_held_lock+0x2c/0x110 [ 1253.621157] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1253.622340] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1253.623442] ? do_vfs_ioctl+0x283/0x10d0 [ 1253.624271] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1253.625403] ? generic_block_fiemap+0x60/0x60 [ 1253.626369] ? lock_downgrade+0x6d0/0x6d0 [ 1253.627316] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1253.628313] ? wait_for_completion_io+0x270/0x270 [ 1253.629379] ? selinux_file_ioctl+0xb6/0x270 [ 1253.630320] ? __ext4_ioctl+0x4220/0x4220 [ 1253.631175] __x64_sys_ioctl+0x19a/0x210 [ 1253.632072] do_syscall_64+0x33/0x40 [ 1253.632976] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1253.634029] RIP: 0033:0x7fa3bc6a6b19 [ 1253.634810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.638719] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1253.640267] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1253.641766] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1253.643365] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1253.644836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1253.646466] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1253.673003] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1253.696841] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:55:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) close(r1) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:55:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x480) [ 1253.717897] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1253.717897] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1253.717897] 23:55:02 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1253.788129] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:55:02 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:02 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1253.831079] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9206 comm=syz-executor.2 [ 1253.856380] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9209 comm=syz-executor.1 23:55:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000080)='+', 0x1, 0x0) r2 = openat(r1, &(0x7f0000000280)='./file1\x00', 0x20000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x7fb) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f0000000000), 0x4) sendfile(r0, r2, 0x0, 0x100000001) [ 1253.950216] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9215 comm=syz-executor.5 23:55:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:55:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x500) 23:55:02 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:02 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:02 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x44) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) [ 1254.042815] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9221 comm=syz-executor.1 [ 1254.046458] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9223 comm=syz-executor.2 [ 1254.065906] loop1: detected capacity change from 0 to 16776704 [ 1254.088660] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9229 comm=syz-executor.0 [ 1254.103099] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1254.103099] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1254.103099] [ 1254.150556] loop0: detected capacity change from 0 to 16776704 [ 1254.158587] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1254.166529] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1254.166529] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1254.166529] [ 1254.192482] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1267.266037] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9242 comm=syz-executor.1 23:55:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:55:15 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:15 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x600) 23:55:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 4) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:55:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r2, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$cgroup_type(r1, &(0x7f00000000c0), 0x2, 0x0) pwrite64(r4, &(0x7f0000000080)="ff3b", 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14, 0x69, 0x1, {0x8, 0x2, 0x4}}, 0x14) 23:55:15 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:15 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1267.282837] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9249 comm=syz-executor.0 [ 1267.290288] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9251 comm=syz-executor.5 [ 1267.294206] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9250 comm=syz-executor.2 [ 1267.312950] loop1: detected capacity change from 0 to 16776704 [ 1267.350695] loop5: detected capacity change from 0 to 16776704 [ 1267.362471] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1267.362471] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1267.362471] 23:55:15 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1267.377109] loop0: detected capacity change from 0 to 16776704 [ 1267.386086] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1267.401732] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1267.401732] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1267.401732] [ 1267.412262] FAULT_INJECTION: forcing a failure. [ 1267.412262] name failslab, interval 1, probability 0, space 0, times 0 [ 1267.415475] CPU: 1 PID: 9257 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1267.416929] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1267.418715] Call Trace: [ 1267.419286] dump_stack+0x107/0x167 [ 1267.420062] should_fail.cold+0x5/0xa [ 1267.420872] ? jbd2__journal_start+0x190/0x7e0 [ 1267.421853] should_failslab+0x5/0x20 [ 1267.422660] kmem_cache_alloc+0x5b/0x310 [ 1267.423528] jbd2__journal_start+0x190/0x7e0 [ 1267.424469] __ext4_journal_start_sb+0x214/0x390 [ 1267.425495] ext4_move_extents+0x10bb/0x3050 [ 1267.426461] ? lock_acquire+0x197/0x470 [ 1267.427316] ? lock_acquire+0x197/0x470 [ 1267.428151] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1267.429277] ? lock_release+0x680/0x680 [ 1267.430146] __ext4_ioctl+0x3048/0x4220 [ 1267.430998] ? ext4_reset_inode_seed+0x450/0x450 [ 1267.432003] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1267.433112] ? find_held_lock+0x2c/0x110 [ 1267.434006] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1267.435228] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1267.436326] ? do_vfs_ioctl+0x283/0x10d0 [ 1267.437196] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1267.438310] ? generic_block_fiemap+0x60/0x60 [ 1267.439257] ? lock_downgrade+0x6d0/0x6d0 [ 1267.440134] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1267.441157] ? wait_for_completion_io+0x270/0x270 [ 1267.442203] ? selinux_file_ioctl+0xb6/0x270 [ 1267.443142] ? __ext4_ioctl+0x4220/0x4220 [ 1267.444022] __x64_sys_ioctl+0x19a/0x210 [ 1267.444881] do_syscall_64+0x33/0x40 [ 1267.445684] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1267.446766] RIP: 0033:0x7fa3bc6a6b19 [ 1267.447561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1267.451485] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1267.453108] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1267.454633] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1267.456161] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1267.457696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1267.459224] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1267.459494] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1267.459494] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1267.459494] [ 1267.486279] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9265 comm=syz-executor.2 [ 1267.503865] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1267.523938] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:55:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x700) 23:55:16 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:16 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1267.601643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9269 comm=syz-executor.1 23:55:16 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1267.658960] loop1: detected capacity change from 0 to 16776704 [ 1267.723674] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9277 comm=syz-executor.0 [ 1267.727162] loop5: detected capacity change from 0 to 16776704 [ 1267.766065] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1267.766065] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1267.766065] [ 1267.793199] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1267.802457] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1267.802457] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1267.802457] [ 1267.821164] loop0: detected capacity change from 0 to 16776704 [ 1267.830211] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1267.830211] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1267.830211] [ 1267.851023] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1267.864655] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:55:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x900) 23:55:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xac540, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x40, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) pipe(0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(r3, &(0x7f0000000240)={0x11, 0x8, r5, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_int(r6, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(r6, &(0x7f0000000240)={0x11, 0x8, r8, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)={0x324, 0x0, 0x100, 0x3, 0x25dfdbfc, {}, [@ETHTOOL_A_FEATURES_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_FEATURES_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_FEATURES_WANTED={0x1c4, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xa0, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'rfdno'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'trans=fd,'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5c}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x64e}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'rfdno'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '@{\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}.\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x114, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'rfdno'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\xd5}\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffd}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '-Z-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'wfdno'}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x357}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'wfdno'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'wfdno'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffbff}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ')$/D\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'rfdno'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x21c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\'\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'rfdno'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x4}, @ETHTOOL_A_FEATURES_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x324}, 0x1, 0x0, 0x0, 0x1}, 0xcab7cab9b20a00c4) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r9, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000100)) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) [ 1281.399649] ====================================================== [ 1281.399649] WARNING: the mand mount option is being deprecated and [ 1281.399649] will be removed in v5.15! [ 1281.399649] ====================================================== 23:55:29 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:29 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 5) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:55:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x0, 0x110) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x94) sendfile(r0, r1, 0x0, 0x100000001) 23:55:29 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1281.412778] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9294 comm=syz-executor.0 [ 1281.414222] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9299 comm=syz-executor.1 [ 1281.425862] loop1: detected capacity change from 0 to 16776704 [ 1281.438155] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1281.438155] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1281.438155] [ 1281.475898] loop0: detected capacity change from 0 to 16776704 [ 1281.491204] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:55:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xb00) [ 1281.504998] FAULT_INJECTION: forcing a failure. [ 1281.504998] name failslab, interval 1, probability 0, space 0, times 0 [ 1281.506383] CPU: 0 PID: 9315 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1281.507196] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1281.508172] Call Trace: [ 1281.508493] dump_stack+0x107/0x167 [ 1281.508930] should_fail.cold+0x5/0xa [ 1281.509383] ? create_object.isra.0+0x3a/0xa30 [ 1281.509929] should_failslab+0x5/0x20 [ 1281.510378] kmem_cache_alloc+0x5b/0x310 [ 1281.510857] create_object.isra.0+0x3a/0xa30 [ 1281.511374] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1281.511950] kmem_cache_alloc+0x159/0x310 [ 1281.512446] jbd2__journal_start+0x190/0x7e0 [ 1281.512979] __ext4_journal_start_sb+0x214/0x390 [ 1281.513528] ext4_move_extents+0x10bb/0x3050 [ 1281.514076] ? lock_acquire+0x197/0x470 [ 1281.514547] ? lock_acquire+0x197/0x470 [ 1281.515020] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1281.515640] ? lock_release+0x680/0x680 [ 1281.516127] __ext4_ioctl+0x3048/0x4220 [ 1281.516593] ? ext4_reset_inode_seed+0x450/0x450 [ 1281.517138] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1281.517763] ? find_held_lock+0x2c/0x110 [ 1281.518224] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1281.518896] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1281.519469] ? do_vfs_ioctl+0x283/0x10d0 [ 1281.519942] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1281.520520] ? generic_block_fiemap+0x60/0x60 [ 1281.520779] loop5: detected capacity change from 0 to 16776704 [ 1281.521033] ? lock_downgrade+0x6d0/0x6d0 [ 1281.522785] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1281.523320] ? wait_for_completion_io+0x270/0x270 [ 1281.523893] ? selinux_file_ioctl+0xb6/0x270 [ 1281.524410] ? __ext4_ioctl+0x4220/0x4220 [ 1281.524904] __x64_sys_ioctl+0x19a/0x210 [ 1281.525360] do_syscall_64+0x33/0x40 [ 1281.525804] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1281.526381] RIP: 0033:0x7fa3bc6a6b19 [ 1281.526790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1281.528817] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1281.529719] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1281.530513] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1281.531290] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1281.532062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1281.532843] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1281.533111] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 23:55:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) dup3(r0, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) [ 1281.533111] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1281.533111] [ 1281.544604] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1281.544604] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1281.544604] 23:55:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1281.564209] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1281.583946] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:55:30 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:30 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1281.673791] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9332 comm=syz-executor.1 23:55:30 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2000) 23:55:30 executing program 3: mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/139, 0x8b, 0x5d6, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) [ 1281.731625] loop5: detected capacity change from 0 to 16776704 23:55:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1281.756511] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9340 comm=syz-executor.0 [ 1281.765645] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1281.765645] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1281.765645] [ 1281.795686] loop0: detected capacity change from 0 to 16776704 [ 1281.803454] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1281.829697] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1281.829697] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1281.829697] [ 1281.853944] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:55:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="018200000000000000000000000000000000f6f62f369fa061a7b0c3cc634fb90c482339edd6660ae4263260b1361512fdec7310cbeaa8ca75b1bf216113e67d96fd2c998088e09ac97ee483d364f96e957259223682bbbd9a960c8ac6ac8be625804654d4f2de10e9d0", @ANYRES32=r5, @ANYBLOB], 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r4, 0x100, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x24}, @val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x8, 0x5b}}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000004}, 0x8000) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x1, 0x0, 0x0, 0x40, 0x2, 0x3e, 0xfffffff9, 0x6d, 0x40, 0x22a, 0xffffffff, 0x101, 0x38, 0x2, 0x41, 0x20, 0x6}, [{0x2, 0x7fffffff, 0x7, 0x80000000, 0x9, 0x200, 0x3, 0x8}, {0x5, 0x6, 0x0, 0x0, 0xf412, 0x7fff, 0x8, 0x8000}], "c6f2749b3faea2330ba3ab13684dd1cf206b1c9f878fceaf93b41c001663e5d8fe412b2362e404309450992ac433f34bad7f63cdf0c0eed3cab2d48c5680ce4255b4d1cb3171fdbd54273b24debafbaa64463b5379c83fe227e11cf2532642c01eab98403629738a413c0f4d1b3559ff4ef6295dc8e7284610981b41b799c57429c30c2f9ddca9155eb5fdff6f34f3897cb73fdeb5558349e793", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x84a) sendfile(r0, r1, 0x0, 0x100000001) 23:55:42 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 6) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:55:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:55:42 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:42 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2103) 23:55:42 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1293.499438] loop0: detected capacity change from 0 to 16776704 [ 1293.503138] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1293.503138] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1293.503138] [ 1293.542584] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9364 comm=syz-executor.1 [ 1293.548219] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1293.551068] loop1: detected capacity change from 0 to 16776704 [ 1293.570669] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1293.570669] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1293.570669] 23:55:42 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1293.602701] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:55:42 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1293.651712] FAULT_INJECTION: forcing a failure. [ 1293.651712] name failslab, interval 1, probability 0, space 0, times 0 [ 1293.651766] loop5: detected capacity change from 0 to 16776704 [ 1293.653448] CPU: 0 PID: 9378 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1293.653455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1293.653459] Call Trace: [ 1293.653477] dump_stack+0x107/0x167 [ 1293.653490] should_fail.cold+0x5/0xa [ 1293.653504] ? create_object.isra.0+0x3a/0xa30 [ 1293.653522] should_failslab+0x5/0x20 [ 1293.659101] kmem_cache_alloc+0x5b/0x310 [ 1293.659586] create_object.isra.0+0x3a/0xa30 [ 1293.660103] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1293.660696] kmem_cache_alloc+0x159/0x310 [ 1293.661200] start_this_handle+0x674/0x1390 [ 1293.661717] ? kmem_cache_alloc+0x159/0x310 [ 1293.662237] ? mark_held_locks+0x9e/0xe0 [ 1293.662703] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 1293.663337] ? trace_hardirqs_on+0x5b/0x180 [ 1293.663839] ? kmem_cache_alloc+0x2a6/0x310 [ 1293.664336] jbd2__journal_start+0x390/0x7e0 [ 1293.664849] __ext4_journal_start_sb+0x214/0x390 [ 1293.665404] ext4_move_extents+0x10bb/0x3050 [ 1293.665935] ? lock_acquire+0x197/0x470 [ 1293.666402] ? lock_acquire+0x197/0x470 [ 1293.666862] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1293.667464] ? lock_release+0x680/0x680 [ 1293.667942] __ext4_ioctl+0x3048/0x4220 [ 1293.668408] ? ext4_reset_inode_seed+0x450/0x450 [ 1293.668956] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1293.669562] ? find_held_lock+0x2c/0x110 [ 1293.670045] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1293.670713] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1293.671310] ? do_vfs_ioctl+0x283/0x10d0 [ 1293.671777] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1293.672391] ? generic_block_fiemap+0x60/0x60 [ 1293.672910] ? lock_downgrade+0x6d0/0x6d0 [ 1293.673391] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1293.673952] ? wait_for_completion_io+0x270/0x270 [ 1293.674514] ? selinux_file_ioctl+0xb6/0x270 [ 1293.675024] ? __ext4_ioctl+0x4220/0x4220 [ 1293.675505] __x64_sys_ioctl+0x19a/0x210 [ 1293.675977] do_syscall_64+0x33/0x40 [ 1293.676408] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1293.677001] RIP: 0033:0x7fa3bc6a6b19 [ 1293.677430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1293.679584] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1293.680467] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1293.681301] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1293.682129] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1293.682979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1293.683813] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 23:55:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2ffb) 23:55:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) r3 = signalfd(r2, &(0x7f0000000000)={[0xd01]}, 0x8) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r4, &(0x7f0000000080)='+', 0x1, 0x0) move_mount(r3, &(0x7f0000000040)='./file1\x00', r4, &(0x7f0000000080)='./file1\x00', 0x12) sendfile(r0, r1, 0x0, 0x100000001) [ 1293.751713] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1293.751713] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1293.751713] [ 1293.763010] loop1: detected capacity change from 0 to 16776704 23:55:42 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1293.778135] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1293.778135] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1293.778135] [ 1293.808004] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1293.812177] loop0: detected capacity change from 0 to 16776704 23:55:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000) [ 1293.855110] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1293.855110] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1293.855110] [ 1293.859640] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1293.913142] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:55:55 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 7) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:55:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:55:55 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:55 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:55:55 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8004) [ 1307.059882] loop5: detected capacity change from 0 to 16776704 [ 1307.073741] loop0: detected capacity change from 0 to 16776704 [ 1307.100748] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1307.100748] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1307.100748] [ 1307.112530] FAULT_INJECTION: forcing a failure. [ 1307.112530] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1307.114328] CPU: 1 PID: 9432 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1307.115165] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.116185] Call Trace: [ 1307.116511] dump_stack+0x107/0x167 [ 1307.116974] should_fail.cold+0x5/0xa [ 1307.117449] __alloc_pages_nodemask+0x182/0x600 [ 1307.118028] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1307.118782] ? find_get_entry+0x2c8/0x740 [ 1307.119299] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 1307.119937] alloc_pages_current+0x187/0x280 [ 1307.120483] __page_cache_alloc+0x2d2/0x360 [ 1307.121019] pagecache_get_page+0x2c7/0xc80 [ 1307.121556] grab_cache_page_write_begin+0x64/0xa0 [ 1307.122170] ext4_move_extents+0x1203/0x3050 [ 1307.122734] ? lock_acquire+0x197/0x470 [ 1307.123233] ? lock_acquire+0x197/0x470 [ 1307.123731] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1307.124372] ? lock_release+0x680/0x680 [ 1307.124876] __ext4_ioctl+0x3048/0x4220 [ 1307.125372] ? ext4_reset_inode_seed+0x450/0x450 [ 1307.125951] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1307.126601] ? find_held_lock+0x2c/0x110 [ 1307.127111] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1307.127813] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1307.128446] ? do_vfs_ioctl+0x283/0x10d0 [ 1307.128939] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1307.129582] ? generic_block_fiemap+0x60/0x60 [ 1307.130138] ? lock_downgrade+0x6d0/0x6d0 [ 1307.130157] loop1: detected capacity change from 0 to 16776704 [ 1307.130640] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1307.130676] ? wait_for_completion_io+0x270/0x270 [ 1307.130694] ? selinux_file_ioctl+0xb6/0x270 [ 1307.130707] ? __ext4_ioctl+0x4220/0x4220 [ 1307.130720] __x64_sys_ioctl+0x19a/0x210 [ 1307.130734] do_syscall_64+0x33/0x40 [ 1307.130745] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1307.130762] RIP: 0033:0x7fa3bc6a6b19 [ 1307.136200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.138463] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1307.139398] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1307.140267] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1307.141148] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1307.142025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.142896] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1307.153531] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1307.153531] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1307.153531] [ 1307.156003] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1307.156003] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1307.156003] 23:55:55 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xad0}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040000}, 0x4010) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:55:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf000) [ 1307.193958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9445 comm=syz-executor.2 [ 1307.198529] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1307.200736] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1307.208085] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:55:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10801, 0x188) 23:55:55 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf002) 23:55:55 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:55 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:55:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1307.310057] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9450 comm=syz-executor.2 [ 1307.415125] loop1: detected capacity change from 0 to 16776704 [ 1307.459702] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1307.459702] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1307.459702] [ 1307.510819] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:56:10 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:10 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) r1 = socket$inet(0x2, 0x3, 0x6) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10) sendmmsg$inet(r1, &(0x7f0000000000), 0x400000d, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_SWAP(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x24, 0x6, 0x6, 0x0, 0x0, 0x0, {0x5, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x804}, 0x800) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f0000000000)=0x1) sendfile(r5, r4, 0x0, 0x7fb) sendfile(r2, r4, 0x0, 0x200) 23:56:10 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:10 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:56:10 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 8) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:56:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfb2f) [ 1322.360518] loop5: detected capacity change from 0 to 16776704 [ 1322.383201] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1322.383201] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1322.383201] [ 1322.409017] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1322.431427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9483 comm=syz-executor.2 [ 1322.436801] FAULT_INJECTION: forcing a failure. [ 1322.436801] name failslab, interval 1, probability 0, space 0, times 0 [ 1322.439860] CPU: 1 PID: 9484 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1322.441497] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1322.443500] Call Trace: [ 1322.444136] dump_stack+0x107/0x167 [ 1322.445028] should_fail.cold+0x5/0xa [ 1322.445941] ? xas_alloc+0x336/0x440 [ 1322.446742] loop1: detected capacity change from 0 to 16776704 [ 1322.446860] should_failslab+0x5/0x20 [ 1322.448567] kmem_cache_alloc+0x5b/0x310 [ 1322.449566] ? try_charge+0x62c/0x1160 [ 1322.450517] xas_alloc+0x336/0x440 [ 1322.451385] xas_create+0x34a/0x10d0 [ 1322.452298] xas_store+0x8c/0x1c40 [ 1322.453160] ? xas_find_conflict+0x4b5/0xa70 [ 1322.454223] __add_to_page_cache_locked+0x708/0xc80 [ 1322.454500] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1322.454500] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1322.454500] [ 1322.455453] ? file_write_and_wait_range+0x130/0x130 [ 1322.455484] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1322.459908] ? find_get_entry+0x2c8/0x740 [ 1322.460895] ? lru_cache_add+0x45c/0x800 [ 1322.461890] add_to_page_cache_lru+0xe6/0x2e0 [ 1322.462974] ? add_to_page_cache_locked+0x40/0x40 [ 1322.464141] ? __page_cache_alloc+0x10d/0x360 [ 1322.465250] pagecache_get_page+0x38b/0xc80 [ 1322.466308] grab_cache_page_write_begin+0x64/0xa0 [ 1322.467508] ext4_move_extents+0x1224/0x3050 [ 1322.468601] ? lock_acquire+0x197/0x470 [ 1322.469562] ? lock_acquire+0x197/0x470 [ 1322.470535] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1322.471787] ? lock_release+0x680/0x680 [ 1322.472765] __ext4_ioctl+0x3048/0x4220 [ 1322.473722] ? ext4_reset_inode_seed+0x450/0x450 [ 1322.474864] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1322.476108] ? find_held_lock+0x2c/0x110 [ 1322.477098] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1322.478486] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1322.479711] ? do_vfs_ioctl+0x283/0x10d0 [ 1322.480681] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1322.481926] ? generic_block_fiemap+0x60/0x60 [ 1322.482987] ? lock_downgrade+0x6d0/0x6d0 [ 1322.483957] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1322.485089] ? wait_for_completion_io+0x270/0x270 [ 1322.486236] ? selinux_file_ioctl+0xb6/0x270 [ 1322.487276] ? __ext4_ioctl+0x4220/0x4220 [ 1322.488259] __x64_sys_ioctl+0x19a/0x210 [ 1322.489233] do_syscall_64+0x33/0x40 [ 1322.490136] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1322.491345] RIP: 0033:0x7fa3bc6a6b19 [ 1322.492222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1322.496564] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1322.498367] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1322.500043] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1322.501723] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1322.503402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1322.505085] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 23:56:11 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1322.518063] loop0: detected capacity change from 0 to 16776704 [ 1322.537576] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1322.537576] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1322.537576] [ 1322.560663] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:56:11 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1322.605134] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1322.625067] loop5: detected capacity change from 0 to 16776704 23:56:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)=ANY=[@ANYBLOB="18000000", @ANYRES16=r6, @ANYBLOB="050000000000000000000c00000004000280"], 0x18}}, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x12e8, 0x22, 0x10, 0x70bd2b, 0x25dfdbfb, {0xd}, [@nested={0x235, 0x27, 0x0, 0x1, [@typed={0xe8, 0x53, 0x0, 0x0, @binary="7d1329f44bb89a7c3dce547155a9a4de99ffd34dae4ab7e1216e819520b35a78a77d03184f21ecc97a3b43f68aa95a0ff23f1931db28e2284a1f11a033187327d4b0e617931b759bf2b280530bcc1ebe7a415b0eb4ce38a0d504bdb43868f10d2203786c2a759183e8866296b2141d3354a429ed1522c09e0a137050ba1ca48b78eb505c9c7cefa94a674d97db4aa02b9380267af18c952414a4f44be6bac748ad493cb94cfeb28720de34d07131000459aac636da908ca6a1c4a3863b641b61b336c9490360d8bd994664a7d3febc135839391f9c053420ac9bb2dbf03529d49ca06c86"}, @typed={0x8, 0x2d, 0x0, 0x0, @uid=0xffffffffffffffff}, @typed={0x2b, 0x48, 0x0, 0x0, @binary="417826dcb2348fba8a25f9def8aa34f4f1580ce3df097bb0e08ec6f00f9fade8b0322c73ae2e5e"}, @generic="8a086e23c1b74170da471a23a80744b96e92a5943933727164b75d77cc7ad71f873cdaf019c6cb0c3e60c7e2bb2cffca88e908737c9f6bb1bd548645dab15a720266e75041cb473f8f655266d858dcc992c655e718825240d7f9f7d1b3bc3fa83f3ff887906b64ffa9cc445303db5566ca9231c3cb07a54354f5b84b2cf547e62c78212e002b322389081c7c2401abbd18468817fd06ba63cb2f422856f425fc143b7831e11fc4a925c305374d8e10bef48fd356882c19ba9e52d2a69a", @typed={0x4e, 0x47, 0x0, 0x0, @binary="ee10592627531a66f440abff9ce73dcf640864b9a4d2fdeaa6bc74609523c2dd690717471dcecaaf87398772d82b5836587f5e12d0e5c8289350e43835761dc91dcc1374372892a90a17"}, @typed={0x8, 0x31, 0x0, 0x0, @fd=r5}]}, @nested={0x103f, 0x33, 0x0, 0x1, [@typed={0x8, 0x3, 0x0, 0x0, @uid=0xee00}, @generic="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", @typed={0x14, 0x66, 0x0, 0x0, @ipv6=@empty}, @generic="91bea1bde56dfced92da60ebd5ee19a5a21350947ee45fec3c0515e0773e2e"]}, @generic="2e83f4c97334d28c53d216334e187666f491e727d16e2751e0fb5c5d95da77db7c2d750c3863a486828c4a9c301669411c867bcc038b83c6d923d2050a8c1682625f78d4f4e355713dd6ec9925a7aa7e58b4ef91ea88e3dc70d6a1"]}, 0x12e8}, 0x1, 0x0, 0x0, 0x48001}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:56:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:56:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x80000) [ 1322.666631] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1322.666631] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1322.666631] 23:56:11 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:11 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1322.770778] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1322.784999] loop0: detected capacity change from 0 to 16776704 23:56:11 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1322.837697] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1322.837697] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1322.837697] [ 1322.884576] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1322.944911] loop1: detected capacity change from 0 to 16776704 [ 1322.976531] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1322.976531] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1322.976531] [ 1323.008962] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:56:26 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(r3, &(0x7f0000000240)={0x11, 0x8, r5, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x58}}, 0x80) sendfile(r0, r1, 0x0, 0x100000001) 23:56:26 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:56:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x100000) 23:56:26 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 9) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) [ 1337.856861] loop1: detected capacity change from 0 to 16776704 23:56:26 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1337.882806] loop0: detected capacity change from 0 to 16776704 [ 1337.936003] loop5: detected capacity change from 0 to 16776704 [ 1337.941636] FAULT_INJECTION: forcing a failure. [ 1337.941636] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.943998] CPU: 0 PID: 9550 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1337.945095] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1337.945095] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1337.945095] [ 1337.945431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1337.945438] Call Trace: [ 1337.945464] dump_stack+0x107/0x167 [ 1337.945487] should_fail.cold+0x5/0xa [ 1337.945516] ? create_object.isra.0+0x3a/0xa30 [ 1337.953511] should_failslab+0x5/0x20 [ 1337.954322] kmem_cache_alloc+0x5b/0x310 [ 1337.955197] create_object.isra.0+0x3a/0xa30 [ 1337.956126] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1337.957217] kmem_cache_alloc+0x159/0x310 [ 1337.958109] xas_alloc+0x336/0x440 [ 1337.958879] xas_create+0x34a/0x10d0 [ 1337.959691] xas_store+0x8c/0x1c40 [ 1337.960455] ? xas_find_conflict+0x4b5/0xa70 [ 1337.961400] __add_to_page_cache_locked+0x708/0xc80 [ 1337.962475] ? file_write_and_wait_range+0x130/0x130 [ 1337.963576] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1337.964659] ? find_get_entry+0x2c8/0x740 [ 1337.965534] ? lru_cache_add+0x45c/0x800 [ 1337.966400] add_to_page_cache_lru+0xe6/0x2e0 [ 1337.967378] ? add_to_page_cache_locked+0x40/0x40 [ 1337.968411] ? __page_cache_alloc+0x10d/0x360 [ 1337.969395] pagecache_get_page+0x38b/0xc80 [ 1337.970326] grab_cache_page_write_begin+0x64/0xa0 [ 1337.971375] ext4_move_extents+0x1224/0x3050 [ 1337.972341] ? lock_acquire+0x197/0x470 [ 1337.973195] ? lock_acquire+0x197/0x470 [ 1337.974054] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1337.975181] ? lock_release+0x680/0x680 [ 1337.976063] __ext4_ioctl+0x3048/0x4220 [ 1337.976923] ? ext4_reset_inode_seed+0x450/0x450 [ 1337.977927] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1337.979054] ? find_held_lock+0x2c/0x110 [ 1337.979936] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1337.981162] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1337.982267] ? do_vfs_ioctl+0x283/0x10d0 [ 1337.983134] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1337.984263] ? generic_block_fiemap+0x60/0x60 [ 1337.985220] ? lock_downgrade+0x6d0/0x6d0 [ 1337.986102] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1337.987155] ? wait_for_completion_io+0x270/0x270 [ 1337.988204] ? selinux_file_ioctl+0xb6/0x270 [ 1337.989145] ? __ext4_ioctl+0x4220/0x4220 [ 1337.990027] __x64_sys_ioctl+0x19a/0x210 [ 1337.990901] do_syscall_64+0x33/0x40 [ 1337.991694] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1337.992780] RIP: 0033:0x7fa3bc6a6b19 [ 1337.993581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1337.997509] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1337.999145] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1338.000669] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1338.002193] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1338.003721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1338.005247] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1338.019477] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1338.019477] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1338.019477] [ 1338.040965] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:56:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x200000) 23:56:26 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1338.066232] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1338.066232] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1338.066232] 23:56:26 executing program 3: preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/128, 0x80}, {&(0x7f0000000140)=""/202, 0xca}], 0x2, 0x1, 0x5) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) [ 1338.109580] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:56:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:56:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf0ffff) [ 1338.185873] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:56:26 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:26 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:26 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1338.440642] loop0: detected capacity change from 0 to 16776704 [ 1338.466600] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1338.466600] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1338.466600] [ 1338.483155] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:56:48 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x5e4e, &(0x7f0000000480), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000080)=0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) r6 = accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c) ftruncate(r6, 0x10001) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:56:48 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 10) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:56:48 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x1000000) 23:56:48 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:56:48 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1359.561852] loop0: detected capacity change from 0 to 16776704 [ 1359.579008] loop5: detected capacity change from 0 to 16776704 [ 1359.603149] loop1: detected capacity change from 0 to 16776704 [ 1359.623164] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1359.623164] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1359.623164] 23:56:48 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2000000) [ 1359.654583] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1359.654583] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1359.654583] [ 1359.656927] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1359.656927] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1359.656927] [ 1359.677085] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1359.679098] FAULT_INJECTION: forcing a failure. [ 1359.679098] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.679123] CPU: 1 PID: 9606 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1359.679135] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.679141] Call Trace: [ 1359.679168] dump_stack+0x107/0x167 [ 1359.679191] should_fail.cold+0x5/0xa [ 1359.679241] ? create_object.isra.0+0x3a/0xa30 [ 1359.687793] should_failslab+0x5/0x20 [ 1359.688599] kmem_cache_alloc+0x5b/0x310 [ 1359.689459] create_object.isra.0+0x3a/0xa30 [ 1359.690399] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1359.691488] kmem_cache_alloc+0x159/0x310 [ 1359.692374] alloc_buffer_head+0x20/0x110 [ 1359.693274] alloc_page_buffers+0x14d/0x700 [ 1359.694226] create_empty_buffers+0x2c/0x640 [ 1359.695181] ? wait_on_page_writeback+0xb9/0x240 [ 1359.696231] ext4_move_extents+0x260c/0x3050 [ 1359.697231] ? lock_acquire+0x197/0x470 [ 1359.698103] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1359.699249] ? lock_release+0x680/0x680 [ 1359.700116] __ext4_ioctl+0x3048/0x4220 [ 1359.700993] ? ext4_reset_inode_seed+0x450/0x450 [ 1359.702020] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1359.703123] ? find_held_lock+0x2c/0x110 [ 1359.703961] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1359.704015] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1359.707024] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1359.708111] ? do_vfs_ioctl+0x283/0x10d0 [ 1359.708995] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1359.710132] ? generic_block_fiemap+0x60/0x60 [ 1359.711100] ? lock_downgrade+0x6d0/0x6d0 [ 1359.712002] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1359.713048] ? wait_for_completion_io+0x270/0x270 [ 1359.714102] ? selinux_file_ioctl+0xb6/0x270 [ 1359.715061] ? __ext4_ioctl+0x4220/0x4220 [ 1359.715940] __x64_sys_ioctl+0x19a/0x210 [ 1359.716800] do_syscall_64+0x33/0x40 [ 1359.717596] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.718674] RIP: 0033:0x7fa3bc6a6b19 [ 1359.719457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.723368] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1359.724978] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1359.726493] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1359.728004] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.729513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1359.731012] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 23:56:48 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1359.786077] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:56:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) dup(0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x100000001) 23:56:48 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x3000000) [ 1359.854492] loop5: detected capacity change from 0 to 16776704 23:56:48 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:48 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1359.950609] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1359.950609] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1359.950609] [ 1359.958979] loop1: detected capacity change from 0 to 16776704 23:56:48 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:56:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000000) 23:56:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000002c0)) sendfile(r0, r1, 0x0, 0x100000001) [ 1360.047650] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1360.047650] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1360.047650] [ 1360.092803] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1360.128746] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:57:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x5000000) 23:57:02 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 11) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:57:02 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:57:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x105142, 0x110) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x109) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:57:02 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:02 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6000000) [ 1374.327208] loop1: detected capacity change from 0 to 16776704 [ 1374.334990] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1374.334990] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1374.334990] [ 1374.356025] loop5: detected capacity change from 0 to 16776704 [ 1374.366136] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:57:02 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1374.395956] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1374.395956] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1374.395956] [ 1374.413754] loop0: detected capacity change from 0 to 16776704 [ 1374.435960] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1374.435960] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1374.435960] [ 1374.448642] FAULT_INJECTION: forcing a failure. [ 1374.448642] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.451482] CPU: 1 PID: 9679 Comm: syz-executor.4 Not tainted 5.10.246 #1 23:57:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1374.453100] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1374.455233] Call Trace: [ 1374.455859] dump_stack+0x107/0x167 [ 1374.456733] should_fail.cold+0x5/0xa [ 1374.457629] ? mempool_alloc+0x148/0x360 [ 1374.458587] ? mempool_free_pages+0x20/0x20 [ 1374.459580] should_failslab+0x5/0x20 [ 1374.460467] kmem_cache_alloc+0x5b/0x310 [ 1374.461440] ? mempool_free_pages+0x20/0x20 [ 1374.462461] mempool_alloc+0x148/0x360 [ 1374.463379] ? mempool_resize+0x7d0/0x7d0 [ 1374.464378] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1374.465424] ? lock_acquire+0x197/0x470 [ 1374.466353] ? create_empty_buffers+0xbc/0x640 [ 1374.467427] bio_alloc_bioset+0x36e/0x600 [ 1374.468394] ? bvec_alloc+0x2f0/0x2f0 [ 1374.469281] ? _ext4_get_block+0x122/0x570 [ 1374.470276] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 1374.471410] ? block_commit_write+0x30/0x30 [ 1374.472421] ext4_read_bh+0x134/0x330 [ 1374.473309] ext4_move_extents+0x21a4/0x3050 [ 1374.474404] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1374.475639] ? lock_release+0x680/0x680 [ 1374.476590] __ext4_ioctl+0x3048/0x4220 [ 1374.477544] ? ext4_reset_inode_seed+0x450/0x450 [ 1374.478656] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1374.479875] ? find_held_lock+0x2c/0x110 [ 1374.480822] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1374.482139] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1374.483294] ? do_vfs_ioctl+0x283/0x10d0 [ 1374.484223] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1374.485426] ? generic_block_fiemap+0x60/0x60 [ 1374.486439] ? lock_downgrade+0x6d0/0x6d0 [ 1374.487416] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1374.488543] ? wait_for_completion_io+0x270/0x270 [ 1374.489672] ? selinux_file_ioctl+0xb6/0x270 [ 1374.490671] ? __ext4_ioctl+0x4220/0x4220 [ 1374.491657] __x64_sys_ioctl+0x19a/0x210 [ 1374.492618] do_syscall_64+0x33/0x40 [ 1374.493486] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1374.494688] RIP: 0033:0x7fa3bc6a6b19 [ 1374.495558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1374.499833] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1374.501612] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1374.503272] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1374.504937] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1374.506605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1374.508275] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1374.528408] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1374.532962] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:57:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 12) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:57:16 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd130, 0x0, @perf_config_ext, 0x0, 0x0, 0x3fe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_io_uring_setup(0x0, &(0x7f0000003480), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000240)) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)=ANY=[@ANYBLOB="18000000", @ANYRES16=r2, @ANYBLOB="a855200700010000000c00000004000280"], 0x18}}, 0x0) ioctl$EXT4_IOC_GETSTATE(r1, 0x40046629, &(0x7f0000000000)) write(0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[], 0xe4}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) 23:57:16 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:57:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7000000) 23:57:16 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x7fb) sendfile(0xffffffffffffffff, r2, 0x0, 0x100000001) 23:57:16 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:16 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1388.460953] loop5: detected capacity change from 0 to 16776704 [ 1388.484692] loop1: detected capacity change from 0 to 16776704 [ 1388.491679] FAULT_INJECTION: forcing a failure. [ 1388.491679] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.493112] CPU: 0 PID: 9711 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1388.493941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1388.493959] loop0: detected capacity change from 0 to 16776704 [ 1388.494957] Call Trace: [ 1388.494977] dump_stack+0x107/0x167 [ 1388.494991] should_fail.cold+0x5/0xa [ 1388.495006] ? create_object.isra.0+0x3a/0xa30 [ 1388.495018] should_failslab+0x5/0x20 [ 1388.495031] kmem_cache_alloc+0x5b/0x310 [ 1388.495043] ? lock_downgrade+0x6d0/0x6d0 [ 1388.495057] create_object.isra.0+0x3a/0xa30 [ 1388.495067] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1388.495082] kmem_cache_alloc+0x159/0x310 [ 1388.495097] ? mempool_free_pages+0x20/0x20 [ 1388.495108] mempool_alloc+0x148/0x360 [ 1388.495123] ? mempool_resize+0x7d0/0x7d0 [ 1388.495143] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1388.495153] ? lock_acquire+0x197/0x470 [ 1388.495165] ? create_empty_buffers+0xbc/0x640 [ 1388.495181] bio_alloc_bioset+0x36e/0x600 [ 1388.495194] ? bvec_alloc+0x2f0/0x2f0 [ 1388.495207] ? _ext4_get_block+0x122/0x570 [ 1388.495223] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 1388.495235] ? block_commit_write+0x30/0x30 [ 1388.495247] ext4_read_bh+0x134/0x330 [ 1388.495259] ext4_move_extents+0x21a4/0x3050 [ 1388.495300] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1388.508500] ? lock_release+0x680/0x680 [ 1388.508993] __ext4_ioctl+0x3048/0x4220 [ 1388.509482] ? ext4_reset_inode_seed+0x450/0x450 [ 1388.510051] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1388.510684] ? find_held_lock+0x2c/0x110 [ 1388.511179] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1388.511872] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1388.512493] ? do_vfs_ioctl+0x283/0x10d0 [ 1388.512977] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1388.513610] ? generic_block_fiemap+0x60/0x60 [ 1388.514147] ? lock_downgrade+0x6d0/0x6d0 [ 1388.514650] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1388.515230] ? wait_for_completion_io+0x270/0x270 [ 1388.515824] ? selinux_file_ioctl+0xb6/0x270 [ 1388.516357] ? __ext4_ioctl+0x4220/0x4220 [ 1388.516862] __x64_sys_ioctl+0x19a/0x210 [ 1388.517350] do_syscall_64+0x33/0x40 [ 1388.517799] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1388.518418] RIP: 0033:0x7fa3bc6a6b19 [ 1388.518868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1388.521108] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1388.522027] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1388.522893] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1388.523753] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1388.524619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1388.525478] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1388.535476] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1388.535476] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1388.535476] 23:57:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x8) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) [ 1388.553623] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1388.553623] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1388.553623] [ 1388.565719] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1388.565719] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1388.565719] [ 1388.574988] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:57:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:57:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x9000000) 23:57:17 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1388.622625] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1388.624108] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:57:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) accept(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000000)=0x80) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x8, r3, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(r4, &(0x7f0000000240)={0x11, 0x8, r6, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r7 = socket$packet(0x11, 0x3, 0x300) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_int(r7, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(r7, &(0x7f0000000240)={0x11, 0x8, r9, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)={0x1cc, r1, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xdae266bf788c7c3f}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x90}, 0x4000080) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{0x0, 0x0, 0x9}], 0x0, &(0x7f0000000440)={[{@fat=@umask}], [{@smackfsdef={'smackfsdef', 0x3d, '\'%^&'}}, {@smackfsroot={'smackfsroot', 0x3d, '+.]'}}, {@fowner_lt={'fowner<', 0xee00}}]}) 23:57:17 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) r3 = socket$nl_generic(0x10, 0x3, 0x10) dup(r2) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r1) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x37c, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_EEE_MODES_OURS={0x320, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x15c, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '}%{)\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffbb}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.ima\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ')\\:^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400000}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.ima\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '!\']!-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.ima\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.ima\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\x15-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.ima\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x85}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.ima\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '^\']\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '!$*\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x99, 0x4, "09d9a9e815fef82f666e78b84739b1f3b09a554681d0e4f1b29dc69ec0b71f6804902589668eadfd2964465fbe42268dc1f896ef6332d67866ac283b885f90b9c21f96e0bbffb6e817286f884cccd819a0c02087a03f744bc11017c8ddef3deb97fe975ef145a012400dd81d8be5d6afe810b862b62f130cc063c2f31296a2767de808c79d925724cffe57b62b0c96b4488b6d8321"}, @ETHTOOL_A_BITSET_MASK={0xeb, 0x5, "0c3ab5799bc20fc8f1868e5fe76dd99b0682274506e641e5dff09e38c66a25fb6e54e4595f2e50764f5a7caa3f0ba9ec7c5bf248f9c5502265963f20957cd0db59ebb4461b2fc96c14ff2a76e919817efe29e5d40ef8936468f0ebdd1daf158a4624017d5658dcfe1b8eeb6cc9b373ac92a3f44b960917e44f0b101468b59be9d77aac66d343f69e32583b6058f37e76c061dd3f66c36fc6efcd3ac690a69c9100b39d2e3ddf653907e1a708ab211633f0ee72f0865a135634a88f66d54ef50c14718f0f7a62d45ddf7b775fa2c04eff2732dfb8f321101ed9a1b8e9a25cf3b95a573972c24395"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xe0}, @ETHTOOL_A_BITSET_BITS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '[\x19,+(\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x37c}, 0x1, 0x0, 0x0, 0x20000000}, 0x48010) fsetxattr$security_ima(r1, &(0x7f0000000000), &(0x7f0000000040)=@md5={0x1, "a44ee07800c52d45fc64faff76a75c6c"}, 0x11, 0x2) [ 1388.748098] loop5: detected capacity change from 0 to 16776704 [ 1388.788980] loop0: detected capacity change from 0 to 16776704 [ 1388.796459] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1388.796459] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1388.796459] [ 1388.809570] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1388.810916] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1388.810916] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1388.810916] 23:57:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 13) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:57:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xb000000) 23:57:17 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:17 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x3b}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd"}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f"}], 0x1, 0x0, 0xffbb}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:57:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) r3 = syz_open_dev$usbmon(&(0x7f0000000000), 0x5, 0x62842) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x10, r3, 0xd188b000) [ 1388.856690] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1388.864911] loop1: detected capacity change from 0 to 16776704 [ 1388.885456] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1388.885456] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1388.885456] [ 1388.902662] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1388.969900] FAULT_INJECTION: forcing a failure. [ 1388.969900] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.972579] CPU: 1 PID: 9762 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1388.974050] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1388.975819] Call Trace: [ 1388.976404] dump_stack+0x107/0x167 [ 1388.977184] should_fail.cold+0x5/0xa [ 1388.977994] ? create_task_io_context+0x2c/0x430 [ 1388.979001] should_failslab+0x5/0x20 [ 1388.979819] kmem_cache_alloc_node+0x55/0x330 [ 1388.980793] create_task_io_context+0x2c/0x430 [ 1388.981772] submit_bio_checks+0x1366/0x1720 [ 1388.982715] ? __lock_acquire+0xbb1/0x5b00 [ 1388.983619] ? trace_event_raw_event_block_rq_requeue+0x560/0x560 [ 1388.984970] submit_bio_noacct+0x82/0x1010 [ 1388.985880] ? blk_queue_enter+0xc30/0xc30 [ 1388.986785] ? lock_acquire+0x197/0x470 [ 1388.987632] ? find_held_lock+0x2c/0x110 [ 1388.988514] submit_bio+0xf3/0x4e0 [ 1388.989288] ? submit_bio_noacct+0x1010/0x1010 [ 1388.990272] submit_bh_wbc.constprop.0+0x580/0x780 [ 1388.991311] ? block_commit_write+0x30/0x30 [ 1388.992243] ext4_read_bh+0x134/0x330 [ 1388.993055] ext4_move_extents+0x21a4/0x3050 [ 1388.994047] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1388.995166] ? lock_release+0x680/0x680 [ 1388.996043] __ext4_ioctl+0x3048/0x4220 [ 1388.996904] ? ext4_reset_inode_seed+0x450/0x450 [ 1388.997929] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1388.999043] ? find_held_lock+0x2c/0x110 [ 1388.999938] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1389.001162] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1389.002250] ? do_vfs_ioctl+0x283/0x10d0 [ 1389.003109] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1389.004222] ? generic_block_fiemap+0x60/0x60 [ 1389.005185] ? lock_downgrade+0x6d0/0x6d0 [ 1389.006062] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1389.007097] ? wait_for_completion_io+0x270/0x270 [ 1389.008147] ? selinux_file_ioctl+0xb6/0x270 [ 1389.009079] ? __ext4_ioctl+0x4220/0x4220 [ 1389.009969] __x64_sys_ioctl+0x19a/0x210 [ 1389.010834] do_syscall_64+0x33/0x40 [ 1389.011619] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1389.012709] RIP: 0033:0x7fa3bc6a6b19 [ 1389.013503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1389.017421] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1389.019050] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1389.020578] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1389.022098] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1389.023612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1389.025134] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 23:57:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10000000) 23:57:31 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 14) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:57:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$inet_int(r0, 0x0, 0xe, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup(r2) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:57:31 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:31 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, 0x0, 0x0, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:57:31 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1403.281823] loop5: detected capacity change from 0 to 16776704 [ 1403.295694] loop0: detected capacity change from 0 to 16776704 [ 1403.313928] loop1: detected capacity change from 0 to 16776704 [ 1403.343837] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1403.343837] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1403.343837] 23:57:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x20000000) 23:57:31 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1403.351663] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1403.351663] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1403.351663] [ 1403.357452] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1403.357452] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1403.357452] [ 1403.375568] FAULT_INJECTION: forcing a failure. [ 1403.375568] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.377086] CPU: 1 PID: 9796 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1403.377875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1403.378855] Call Trace: [ 1403.379173] dump_stack+0x107/0x167 [ 1403.379605] should_fail.cold+0x5/0xa [ 1403.380052] ? create_object.isra.0+0x3a/0xa30 [ 1403.380592] should_failslab+0x5/0x20 [ 1403.381041] kmem_cache_alloc+0x5b/0x310 [ 1403.381520] create_object.isra.0+0x3a/0xa30 [ 1403.382034] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1403.382636] kmem_cache_alloc_node+0x169/0x330 [ 1403.383177] create_task_io_context+0x2c/0x430 [ 1403.383711] submit_bio_checks+0x1366/0x1720 [ 1403.384236] ? __lock_acquire+0xbb1/0x5b00 [ 1403.384730] ? trace_event_raw_event_block_rq_requeue+0x560/0x560 [ 1403.385457] submit_bio_noacct+0x82/0x1010 [ 1403.385965] ? blk_queue_enter+0xc30/0xc30 [ 1403.386461] ? lock_acquire+0x197/0x470 [ 1403.386925] ? find_held_lock+0x2c/0x110 [ 1403.387405] submit_bio+0xf3/0x4e0 [ 1403.387829] ? submit_bio_noacct+0x1010/0x1010 [ 1403.388381] submit_bh_wbc.constprop.0+0x580/0x780 [ 1403.388958] ? block_commit_write+0x30/0x30 [ 1403.389466] ext4_read_bh+0x134/0x330 [ 1403.389911] ext4_move_extents+0x21a4/0x3050 [ 1403.390455] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1403.391069] ? lock_release+0x680/0x680 [ 1403.391558] __ext4_ioctl+0x3048/0x4220 [ 1403.392031] ? ext4_reset_inode_seed+0x450/0x450 [ 1403.392601] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1403.393208] ? find_held_lock+0x2c/0x110 [ 1403.393691] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1403.394359] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1403.394960] ? do_vfs_ioctl+0x283/0x10d0 [ 1403.395431] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1403.396046] ? generic_block_fiemap+0x60/0x60 [ 1403.396570] ? lock_downgrade+0x6d0/0x6d0 [ 1403.397050] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1403.397612] ? wait_for_completion_io+0x270/0x270 [ 1403.398175] ? selinux_file_ioctl+0xb6/0x270 [ 1403.398690] ? __ext4_ioctl+0x4220/0x4220 [ 1403.399172] __x64_sys_ioctl+0x19a/0x210 [ 1403.399649] do_syscall_64+0x33/0x40 [ 1403.400080] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1403.400683] RIP: 0033:0x7fa3bc6a6b19 [ 1403.401116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1403.403245] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1403.404140] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1403.404965] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1403.405801] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1403.406631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1403.407457] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1403.437584] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1403.439773] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1403.465688] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:57:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 15) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:57:45 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, 0x0, 0x0, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:57:45 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x21030000) 23:57:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) r4 = openat2(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x2a0c01, 0x81, 0x4}, 0x18) sendmsg$BATADV_CMD_TP_METER(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x30e}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x8c4}, 0x20008001) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r6, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) sendfile(r2, r5, 0x0, 0x1c) sendfile(r0, r1, 0x0, 0x100000001) 23:57:45 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:45 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1416.695663] loop5: detected capacity change from 0 to 16776704 [ 1416.702165] loop1: detected capacity change from 0 to 16776704 [ 1416.710710] loop0: detected capacity change from 0 to 16776704 23:57:45 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1416.743394] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1416.743394] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1416.743394] [ 1416.745989] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1416.745989] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1416.745989] [ 1416.750996] FAULT_INJECTION: forcing a failure. [ 1416.750996] name failslab, interval 1, probability 0, space 0, times 0 [ 1416.752776] CPU: 1 PID: 9833 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1416.753593] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1416.754595] Call Trace: [ 1416.754924] dump_stack+0x107/0x167 [ 1416.755360] should_fail.cold+0x5/0xa [ 1416.755822] ? kmem_cache_free+0xa7/0x2d0 [ 1416.756317] ? __es_insert_extent+0xed1/0x1370 [ 1416.756878] should_failslab+0x5/0x20 [ 1416.757341] kmem_cache_alloc+0x5b/0x310 [ 1416.757840] __es_insert_extent+0xed1/0x1370 [ 1416.758379] ? __es_tree_search.isra.0+0x1af/0x220 [ 1416.758975] __es_remove_extent+0x72d/0x1560 [ 1416.759511] ? count_rsvd.isra.0+0x540/0x540 [ 1416.760058] ? lock_release+0x680/0x680 [ 1416.760546] ? do_raw_write_lock+0x11a/0x280 [ 1416.761074] ? do_raw_read_unlock+0x70/0x70 [ 1416.761600] ext4_es_remove_extent+0x2e3/0x450 [ 1416.762149] ? ext4_es_lookup_extent+0xa80/0xa80 [ 1416.762727] ? lock_acquire+0x197/0x470 [ 1416.763206] ? ext4_move_extents+0x199c/0x3050 [ 1416.763760] ext4_swap_extents+0x225/0x14c0 [ 1416.764288] ? ext4_get_es_cache+0x620/0x620 [ 1416.764825] ? down_write_nested+0xe4/0x160 [ 1416.765344] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1416.765956] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1416.766639] ext4_move_extents+0x19d5/0x3050 [ 1416.767199] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1416.767833] ? lock_release+0x680/0x680 [ 1416.768329] __ext4_ioctl+0x3048/0x4220 [ 1416.768822] ? ext4_reset_inode_seed+0x450/0x450 [ 1416.769389] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1416.770019] ? find_held_lock+0x2c/0x110 [ 1416.770518] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1416.771221] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1416.771852] ? do_vfs_ioctl+0x283/0x10d0 [ 1416.772343] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1416.772981] ? generic_block_fiemap+0x60/0x60 [ 1416.773533] ? lock_downgrade+0x6d0/0x6d0 [ 1416.774032] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1416.774633] ? wait_for_completion_io+0x270/0x270 [ 1416.775225] ? selinux_file_ioctl+0xb6/0x270 [ 1416.775763] ? __ext4_ioctl+0x4220/0x4220 [ 1416.776269] __x64_sys_ioctl+0x19a/0x210 [ 1416.776802] do_syscall_64+0x33/0x40 [ 1416.777257] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1416.777872] RIP: 0033:0x7fa3bc6a6b19 [ 1416.778318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1416.780522] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1416.781434] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1416.782284] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1416.782524] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1416.782524] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1416.782524] [ 1416.783131] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1416.787623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1416.788480] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 23:57:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x40000000) [ 1416.811629] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1416.813840] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1416.831230] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:57:45 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:45 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:45 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:45 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, 0x0, 0x0, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:57:45 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 16) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:57:58 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) syz_io_uring_setup(0x5e4e, &(0x7f0000000480), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000080)=0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r6, &(0x7f0000000080)='+', 0x1, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000180)=@IORING_OP_STATX={0x15, 0x0, 0x0, r6, &(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x400, 0x0, 0x1, {0x0, r7}}, 0x5) 23:57:58 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x80040000) 23:57:58 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}], 0x2, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:57:58 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1430.394973] loop0: detected capacity change from 0 to 16776704 [ 1430.402913] loop1: detected capacity change from 0 to 16776704 23:57:58 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1430.439613] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1430.439613] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1430.439613] [ 1430.444182] loop5: detected capacity change from 0 to 16776704 [ 1430.458497] FAULT_INJECTION: forcing a failure. [ 1430.458497] name failslab, interval 1, probability 0, space 0, times 0 [ 1430.461220] CPU: 0 PID: 9883 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1430.462662] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1430.464404] Call Trace: [ 1430.464973] dump_stack+0x107/0x167 [ 1430.465745] should_fail.cold+0x5/0xa [ 1430.466561] ? create_object.isra.0+0x3a/0xa30 [ 1430.467528] should_failslab+0x5/0x20 [ 1430.468338] kmem_cache_alloc+0x5b/0x310 [ 1430.469226] ? stack_trace_consume_entry+0x160/0x160 [ 1430.470302] create_object.isra.0+0x3a/0xa30 [ 1430.471232] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1430.472309] kmem_cache_alloc+0x159/0x310 [ 1430.473464] __es_insert_extent+0xed1/0x1370 [ 1430.474632] ? __es_tree_search.isra.0+0x1af/0x220 [ 1430.475874] __es_remove_extent+0x72d/0x1560 [ 1430.477023] ? count_rsvd.isra.0+0x540/0x540 [ 1430.478074] ? lock_release+0x680/0x680 [ 1430.478927] ? do_raw_write_lock+0x11a/0x280 [ 1430.479865] ? do_raw_read_unlock+0x70/0x70 [ 1430.480806] ext4_es_remove_extent+0x2e3/0x450 [ 1430.481787] ? ext4_es_lookup_extent+0xa80/0xa80 [ 1430.482787] ? lock_acquire+0x197/0x470 [ 1430.483623] ? ext4_move_extents+0x199c/0x3050 [ 1430.484605] ext4_swap_extents+0x225/0x14c0 [ 1430.485526] ? trace_hardirqs_on+0x5b/0x180 [ 1430.486463] ? ext4_get_es_cache+0x620/0x620 [ 1430.487391] ? down_write_nested+0xe4/0x160 [ 1430.487752] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1430.487752] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1430.487752] [ 1430.488305] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1430.488329] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1430.488356] ext4_move_extents+0x19d5/0x3050 [ 1430.488434] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1430.495858] ? lock_release+0x680/0x680 [ 1430.496740] __ext4_ioctl+0x3048/0x4220 [ 1430.497600] ? ext4_reset_inode_seed+0x450/0x450 [ 1430.498604] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1430.499723] ? find_held_lock+0x2c/0x110 [ 1430.500600] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1430.501831] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1430.502915] ? do_vfs_ioctl+0x283/0x10d0 [ 1430.503786] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1430.504904] ? generic_block_fiemap+0x60/0x60 [ 1430.505849] ? lock_downgrade+0x6d0/0x6d0 [ 1430.506721] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1430.507738] ? wait_for_completion_io+0x270/0x270 [ 1430.508771] ? selinux_file_ioctl+0xb6/0x270 [ 1430.509702] ? __ext4_ioctl+0x4220/0x4220 [ 1430.510581] __x64_sys_ioctl+0x19a/0x210 [ 1430.511450] do_syscall_64+0x33/0x40 [ 1430.512229] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1430.513317] RIP: 0033:0x7fa3bc6a6b19 [ 1430.514128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1430.518045] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1430.519668] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1430.521205] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1430.522744] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1430.524279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1430.525842] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1430.549559] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1430.549559] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1430.549559] [ 1430.576016] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1430.583010] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:57:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYRES16=r0], 0x20}, 0x1, 0x0, 0x0, 0x8801}, 0x45) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) 23:57:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}], 0x2, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:57:59 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1430.646997] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:57:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x807f0000) 23:57:59 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:57:59 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1430.723981] loop1: detected capacity change from 0 to 16776704 [ 1430.745537] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1430.745537] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1430.745537] 23:57:59 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36d"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1430.803062] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1430.900104] loop5: detected capacity change from 0 to 16776704 [ 1430.915028] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9914 comm=syz-executor.0 [ 1430.942922] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1430.942922] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1430.942922] [ 1430.950685] loop0: detected capacity change from 0 to 16776704 [ 1430.966979] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1430.973491] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1430.973491] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1430.973491] [ 1431.000060] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:58:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8cffffff) 23:58:14 executing program 2: r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x10000000) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYRESHEX=r0, @ANYBLOB="e95adc67c9be9aa142a1822168b3e91fbfa25dc24b23970aa6647323cb691511bbe28ea8b72555b1e6d2d8a6887b38818bbf3ead28685c4e2fa0b549ce137ad633d3bd38a0e3e977329f1037fa740cb4da5ca93bd3c73e"], 0x24}, 0x1, 0x0, 0x0, 0x4000011}, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x101, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r4 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20010, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) ioctl$CDROMREADALL(0xffffffffffffffff, 0x5318, &(0x7f0000001a80)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000002c0)={{}, {@void, @max}}) openat$full(0xffffffffffffff9c, &(0x7f00000003c0), 0x1, 0x0) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 23:58:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}], 0x2, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:58:14 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x40) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) sendfile(r2, r1, 0x0, 0x6) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x0, 0x3ff, 0x40, @empty, @remote, 0x700, 0x8000, 0x7, 0xffffff98}}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x8, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'syztnl2\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x4, 0x81, 0x0, 0xfffffc01, 0x3c, @dev={0xfe, 0x80, '\x00', 0x15}, @loopback, 0x10, 0x10, 0x7488}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x2f, 0x81, 0x3f, 0x5ac, 0xf, @dev={0xfe, 0x80, '\x00', 0x20}, @loopback, 0x80, 0x8, 0xfffffeff, 0x10d}}) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r9 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r9, &(0x7f0000000080)='+', 0x1, 0x0) setsockopt$packet_int(r9, 0x107, 0x15, &(0x7f0000000040)=0x3f, 0x4) bind$packet(r6, &(0x7f0000000240)={0x11, 0x8, r8, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x68, 0x0, 0x4, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20040000}, 0x4004014) sendfile(r0, r1, 0x0, 0x100000001) 23:58:14 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36d"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:14 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36d"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 17) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) [ 1446.351072] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9934 comm=syz-executor.0 [ 1446.365163] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9938 comm=syz-executor.5 [ 1446.368612] loop1: detected capacity change from 0 to 16776704 [ 1446.388920] loop0: detected capacity change from 0 to 16776704 [ 1446.425974] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1446.425974] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1446.425974] [ 1446.430895] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1446.430895] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1446.430895] [ 1446.440350] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1446.441891] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1446.448735] FAULT_INJECTION: forcing a failure. [ 1446.448735] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.451569] CPU: 1 PID: 9944 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1446.453020] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1446.454800] Call Trace: [ 1446.455378] dump_stack+0x107/0x167 [ 1446.456161] should_fail.cold+0x5/0xa [ 1446.456973] ? kmem_cache_free+0xa7/0x2d0 [ 1446.457888] ? __es_insert_extent+0xed1/0x1370 [ 1446.458864] should_failslab+0x5/0x20 [ 1446.459656] kmem_cache_alloc+0x5b/0x310 [ 1446.460501] __es_insert_extent+0xed1/0x1370 [ 1446.461433] ? __es_tree_search.isra.0+0x1af/0x220 [ 1446.462448] __es_remove_extent+0x72d/0x1560 [ 1446.463366] ? count_rsvd.isra.0+0x540/0x540 [ 1446.464291] ? lock_release+0x680/0x680 [ 1446.465125] ? do_raw_write_lock+0x11a/0x280 [ 1446.466036] ? do_raw_read_unlock+0x70/0x70 [ 1446.466959] ext4_es_remove_extent+0x2e3/0x450 [ 1446.467930] ? ext4_es_lookup_extent+0xa80/0xa80 [ 1446.468944] ? lock_acquire+0x197/0x470 [ 1446.469783] ? ext4_move_extents+0x2523/0x3050 [ 1446.470729] ext4_swap_extents+0x225/0x14c0 [ 1446.471634] ? trace_hardirqs_on+0x5b/0x180 [ 1446.472540] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1446.473715] ? ext4_get_es_cache+0x620/0x620 [ 1446.474643] ? down_write_nested+0xe4/0x160 [ 1446.475564] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1446.476630] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1446.477850] ext4_move_extents+0x19d5/0x3050 [ 1446.478858] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1446.479982] ? lock_release+0x680/0x680 [ 1446.480833] __ext4_ioctl+0x3048/0x4220 23:58:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1446.481671] ? ext4_reset_inode_seed+0x450/0x450 [ 1446.482860] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1446.483959] ? find_held_lock+0x2c/0x110 [ 1446.484842] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1446.486074] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1446.487179] ? do_vfs_ioctl+0x283/0x10d0 [ 1446.488045] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1446.489165] ? generic_block_fiemap+0x60/0x60 [ 1446.490108] ? lock_downgrade+0x6d0/0x6d0 [ 1446.491004] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1446.492018] ? wait_for_completion_io+0x270/0x270 [ 1446.493062] ? selinux_file_ioctl+0xb6/0x270 [ 1446.494000] ? __ext4_ioctl+0x4220/0x4220 [ 1446.494882] __x64_sys_ioctl+0x19a/0x210 [ 1446.495745] do_syscall_64+0x33/0x40 [ 1446.496532] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1446.497621] RIP: 0033:0x7fa3bc6a6b19 [ 1446.498417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1446.502349] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1446.503974] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1446.505493] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1446.507010] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1446.508483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1446.510007] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1446.515104] loop5: detected capacity change from 0 to 16776704 23:58:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf0020000) [ 1446.566487] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1446.584930] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1446.588623] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1446.588623] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1446.588623] 23:58:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 23:58:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = accept4(r1, &(0x7f0000000000)=@can, &(0x7f0000000080)=0x80, 0x80000) sendmsg$NL80211_CMD_GET_SCAN(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x1, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0xfffffffc, 0x18}}}}, ["", "", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0xc000}, 0x4040004) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xe2, 0xf8, 0x5, 0x4, 0x3, 0x3, 0x1, 0x143, 0x40, 0x371, 0x401, 0x3, 0x38, 0x1, 0x5}, [{0x3, 0x863, 0x10001, 0x5, 0x5, 0x3ff, 0x7, 0x2}], "841b7a056e5c9bc85dede92036f04df1aa9d2574d48241773c2ad5d3735843730d8f17136d2be9a125084251bcbb80dd48f5e8c6cdc154bd30ec6ca4", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9b4) r3 = open(&(0x7f0000000c80)='./file1\x00', 0x660000, 0x10) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x800433, &(0x7f0000000cc0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_uid={'access', 0x3d, r4}}, {@aname}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@cache_none}, {@access_user}], [{@audit}, {@appraise_type}, {@dont_appraise}, {@seclabel}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}}) socket$nl_generic(0x10, 0x3, 0x10) mount$cgroup(0x0, &(0x7f0000000dc0)='./file1\x00', &(0x7f0000000e00), 0x80011, &(0x7f0000000e40)={[{@noprefix}, {@subsystem='net'}, {@name={'name', 0x3d, '(#+'}}, {}], [{@permit_directio}, {@subj_user={'subj_user', 0x3d, 'cache=none'}}]}) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) [ 1446.693131] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:58:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:58:15 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:15 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36d"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1446.890186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9972 comm=syz-executor.0 23:58:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000080)='+', 0x1, 0x0) r2 = openat(r1, &(0x7f0000000280)='/proc/self/exe\x00', 0x400000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x7fb) sendfile(r0, r2, 0x0, 0x100000001) 23:58:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:58:28 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfb2f0000) 23:58:28 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36d"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:28 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:28 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 18) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) [ 1460.394511] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9980 comm=syz-executor.0 [ 1460.404534] loop1: detected capacity change from 0 to 16776704 [ 1460.411676] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1460.411676] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1460.411676] [ 1460.448172] loop0: detected capacity change from 0 to 16776704 [ 1460.454393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=9996 comm=syz-executor.5 [ 1460.467659] FAULT_INJECTION: forcing a failure. [ 1460.467659] name failslab, interval 1, probability 0, space 0, times 0 [ 1460.470563] CPU: 1 PID: 9997 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1460.472031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1460.473793] Call Trace: [ 1460.474363] dump_stack+0x107/0x167 [ 1460.475149] should_fail.cold+0x5/0xa [ 1460.475967] ? create_object.isra.0+0x3a/0xa30 [ 1460.476948] should_failslab+0x5/0x20 [ 1460.477795] kmem_cache_alloc+0x5b/0x310 [ 1460.478684] ? stack_trace_consume_entry+0x160/0x160 [ 1460.479458] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1460.479779] create_object.isra.0+0x3a/0xa30 [ 1460.481689] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1460.482797] kmem_cache_alloc+0x159/0x310 [ 1460.483682] __es_insert_extent+0xed1/0x1370 [ 1460.484619] ? __es_tree_search.isra.0+0x1af/0x220 [ 1460.485667] __es_remove_extent+0x72d/0x1560 [ 1460.486616] ? count_rsvd.isra.0+0x540/0x540 [ 1460.487556] ? lock_release+0x680/0x680 [ 1460.488397] ? do_raw_write_lock+0x11a/0x280 [ 1460.489335] ? do_raw_read_unlock+0x70/0x70 [ 1460.489558] loop5: detected capacity change from 0 to 16776704 [ 1460.490261] ext4_es_remove_extent+0x2e3/0x450 [ 1460.490285] ? ext4_es_lookup_extent+0xa80/0xa80 [ 1460.492911] ? lock_acquire+0x197/0x470 [ 1460.493785] ? ext4_move_extents+0x199c/0x3050 [ 1460.494760] ext4_swap_extents+0x225/0x14c0 [ 1460.495697] ? trace_hardirqs_on+0x5b/0x180 [ 1460.496642] ? ext4_get_es_cache+0x620/0x620 [ 1460.497600] ? down_write_nested+0xe4/0x160 [ 1460.498513] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1460.499609] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1460.500605] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1460.500605] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1460.500605] [ 1460.500829] ext4_move_extents+0x19d5/0x3050 [ 1460.500907] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1460.504608] ? lock_release+0x680/0x680 [ 1460.505499] __ext4_ioctl+0x3048/0x4220 [ 1460.506372] ? ext4_reset_inode_seed+0x450/0x450 [ 1460.507378] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1460.508485] ? find_held_lock+0x2c/0x110 [ 1460.509407] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1460.510696] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1460.511798] ? do_vfs_ioctl+0x283/0x10d0 [ 1460.512670] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1460.513801] ? generic_block_fiemap+0x60/0x60 [ 1460.514755] ? lock_downgrade+0x6d0/0x6d0 [ 1460.515634] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1460.516660] ? wait_for_completion_io+0x270/0x270 [ 1460.517702] ? selinux_file_ioctl+0xb6/0x270 [ 1460.518636] ? __ext4_ioctl+0x4220/0x4220 [ 1460.519528] __x64_sys_ioctl+0x19a/0x210 [ 1460.520414] do_syscall_64+0x33/0x40 [ 1460.521200] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1460.522303] RIP: 0033:0x7fa3bc6a6b19 [ 1460.523092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1460.526989] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1460.528611] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1460.530120] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1460.531640] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1460.533138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1460.534659] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1460.538170] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1460.538170] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1460.538170] [ 1460.553640] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1460.567854] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:58:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfbffffff) 23:58:29 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:29 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:29 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1460.627597] loop1: detected capacity change from 0 to 16776704 23:58:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}], 0x1}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1460.642466] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1460.642466] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1460.642466] [ 1460.657649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10016 comm=syz-executor.0 23:58:29 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1460.682098] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:58:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x7fb) sendfile(r0, r1, 0x0, 0x100000001) socket$netlink(0x10, 0x3, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x3c) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x1c, r4, 0x200, 0x70bd2d, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000010) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x3c) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x1c, r7, 0x200, 0x70bd2d, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000010) sendmsg$TIPC_CMD_SET_NODE_ADDR(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r7, 0x100, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x6}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4000) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r7, 0x100, 0x70bd25, 0x25dfdbfa, {{}, {}, {0x8, 0x11, 0x7}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000004}, 0x4000) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r4, 0x533, 0x70bd2a, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x801) [ 1460.698044] loop0: detected capacity change from 0 to 16776704 [ 1460.719994] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1460.719994] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1460.719994] 23:58:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfeffffff) 23:58:29 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36d"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1460.765472] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:58:29 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:29 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}], 0x1}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1460.823460] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10033 comm=syz-executor.5 [ 1460.842031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10039 comm=syz-executor.0 [ 1460.856947] loop5: detected capacity change from 0 to 16776704 [ 1460.873916] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1460.873916] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1460.873916] [ 1460.875732] loop0: detected capacity change from 0 to 16776704 [ 1460.892620] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1460.892620] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1460.892620] [ 1460.894452] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1460.931093] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1460.945078] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10032 comm=syz-executor.3 [ 1460.965944] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10047 comm=syz-executor.3 23:58:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 19) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:58:45 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:45 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc376525038"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:45 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:45 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}], 0x1}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:58:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) openat2(r0, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)={0x41c0, 0x2, 0x13}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f00000004c0)={0x0, @adiantum}) r6 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file1\x00', 0x6, 0x4, &(0x7f0000000380)=[{&(0x7f0000000180)="cd69762aac0f3085a88375b203e568e85a7ece00e1", 0x15, 0x5}, {&(0x7f00000001c0)="12aeba6dac14b710e1b8fd41f9fe36b39c1b46d196c060f5774a62b62bf1f153fb82a799cad4901743f8e689db894f060bf9e04b4ae5453126ecb18b21fe5c94fbbcb50966511bfe147462fa8a", 0x4d, 0x20}, {&(0x7f0000000240)="d63e42", 0x3, 0x6}, {&(0x7f00000002c0)="5662b7a3a7a753f9bb63cae7ef4ba49ea7253c351e9cc9fe7e6fd147b60b79994390e1337fb931195dd6f31d21e4a9250167830ca87a481d5325c3973a5b10948ad55a1a5432c3c2492aabad68c9e80d987e93e906115c09f3bc2e7da9c549c53ffceb4740a1000b352c7c8e62a73d64c8a2a75c4d5b3ddfdd85dffba53da08e57c25d4f401a63c97a923d8bfefefb6913", 0x91, 0x8001}], 0x210800c, &(0x7f0000000400)={[{@huge_never}, {@huge_within_size}, {@huge_always}, {@mpol={'mpol', 0x3d, {'default', '', @void}}}, {@mpol={'mpol', 0x3d, {'default', '', @val={0x3a, [0x34, 0x33, 0x2f, 0x32, 0x39, 0x2d, 0x32]}}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x34, 0x74]}}], [{@uid_gt={'uid>', 0xee01}}, {@pcr={'pcr', 0x3d, 0x22}}, {@smackfsroot={'smackfsroot', 0x3d, ':)+['}}]}) sendfile(r6, r2, 0x0, 0x7eb) sendfile(r0, r1, 0x0, 0x100000001) r7 = socket$packet(0x11, 0x3, 0x300) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_int(r7, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(r7, &(0x7f0000000240)={0x11, 0x8, r9, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000005c0), 0xc, &(0x7f0000000940)={&(0x7f00000009c0)={0x184, r5, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_EEE_MODES_OURS={0xf4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_VALUE={0x45, 0x4, "5acacf1a22b10f6d4b45c53512e83d3d3452f4bd4b61fd022ce87c2c108f54239f18b6676065e0f9555bbf48ada3c9a4ae7125ea3d5d1a65a878dae8fb2fbb11f8"}, @ETHTOOL_A_BITSET_VALUE={0x9e, 0x4, "cc6d65f35a2133f4e69fa2b229ad11d5b309f23d5b301cdee9361e5a59a2c171f2793feb6a498463dd9d0c12d9d92f93446930cc8449252a69abbd1c5f2bf2ecda8932b8ae75805c5e72d930d69707fbf1c537192c3bd6b141d2aca2b3d29674124487d71e403268c3b6e1bd5fd3e69a26605cd9f8aa69cd75e64b20ae297aa0ea927be23845100af200e3584862b17e47dc94d4beffada837be"}]}, @ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x184}}, 0x24040040) 23:58:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffff000) [ 1476.631968] loop3: detected capacity change from 0 to 65536 [ 1476.633129] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10060 comm=syz-executor.0 [ 1476.634798] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10070 comm=syz-executor.2 [ 1476.655515] loop1: detected capacity change from 0 to 16776704 23:58:45 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1476.657312] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10074 comm=syz-executor.5 [ 1476.670936] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1476.670936] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1476.670936] [ 1476.691447] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1476.691544] loop0: detected capacity change from 0 to 16776704 [ 1476.723615] FAULT_INJECTION: forcing a failure. [ 1476.723615] name failslab, interval 1, probability 0, space 0, times 0 [ 1476.726598] CPU: 0 PID: 10078 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1476.727731] loop5: detected capacity change from 0 to 16776704 [ 1476.728072] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1476.730572] Call Trace: [ 1476.731151] dump_stack+0x107/0x167 23:58:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {0x0}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1476.731920] should_fail.cold+0x5/0xa [ 1476.732851] ? create_object.isra.0+0x3a/0xa30 [ 1476.733836] should_failslab+0x5/0x20 [ 1476.734646] kmem_cache_alloc+0x5b/0x310 [ 1476.735528] create_object.isra.0+0x3a/0xa30 [ 1476.736461] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1476.737538] __kmalloc+0x16e/0x390 [ 1476.738302] ext4_find_extent+0xa77/0xd70 [ 1476.739197] ext4_swap_extents+0x323/0x14c0 [ 1476.740099] ? io_schedule_timeout+0x140/0x140 [ 1476.741057] ? jbd2_journal_grab_journal_head+0x39/0x1f0 [ 1476.742209] ? ext4_get_es_cache+0x620/0x620 [ 1476.743134] ? down_write_nested+0xe4/0x160 [ 1476.744043] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1476.745107] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1476.746314] ext4_move_extents+0x19d5/0x3050 [ 1476.747299] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1476.748407] ? lock_release+0x680/0x680 [ 1476.749274] __ext4_ioctl+0x3048/0x4220 [ 1476.750127] ? ext4_reset_inode_seed+0x450/0x450 [ 1476.751133] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1476.752245] ? find_held_lock+0x2c/0x110 [ 1476.753117] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1476.754335] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1476.755438] ? do_vfs_ioctl+0x283/0x10d0 [ 1476.756295] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1476.757405] ? generic_block_fiemap+0x60/0x60 [ 1476.758357] ? lock_downgrade+0x6d0/0x6d0 [ 1476.759225] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1476.760248] ? wait_for_completion_io+0x270/0x270 [ 1476.761270] ? selinux_file_ioctl+0xb6/0x270 [ 1476.762202] ? __ext4_ioctl+0x4220/0x4220 [ 1476.763070] __x64_sys_ioctl+0x19a/0x210 [ 1476.763936] do_syscall_64+0x33/0x40 [ 1476.764730] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1476.765822] RIP: 0033:0x7fa3bc6a6b19 [ 1476.766610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1476.770499] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1476.772123] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1476.773625] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1476.775128] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1476.776635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1476.778159] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1476.787743] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1476.787743] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1476.787743] [ 1476.804938] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1476.839472] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1476.839472] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1476.839472] [ 1476.841704] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10088 comm=syz-executor.2 23:58:45 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc376525038"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffff7f) 23:58:45 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1476.892643] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1476.948205] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10097 comm=syz-executor.0 23:58:45 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1476.964553] loop1: detected capacity change from 0 to 16776704 23:58:45 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1476.999871] loop0: detected capacity change from 0 to 16776704 [ 1477.011116] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1477.011116] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1477.011116] 23:58:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffff8c) [ 1477.025970] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1477.025970] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1477.025970] [ 1477.062088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10107 comm=syz-executor.5 [ 1477.071766] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1477.080811] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10108 comm=syz-executor.2 [ 1477.085728] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1477.093178] loop5: detected capacity change from 0 to 16776704 [ 1477.126623] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1477.126623] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1477.126623] [ 1477.172746] loop3: detected capacity change from 0 to 65536 [ 1477.182528] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:58:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffff6) 23:58:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {0x0}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:58:58 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x80000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000001c000a000900000000000000010000000100000003000000000000000101000000000000000000000000000000000000000000000000000000000000080000008a00000000000000006606000900000000000000ff0f0000000000003f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000"]) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)=ANY=[@ANYBLOB="18000004", @ANYRES16=r6, @ANYBLOB="010000006adec42b2c75fc0b280000000000"], 0x18}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000700)=ANY=[@ANYBLOB="c2d5cabe69d9", @ANYRES16, @ANYBLOB="018200000000000000000000000000000000f6f62f369fa061a7b0c3cc634fb90c482339edd6660ae4263260b1361512fdec7310cbeaa8ca75b1bf216113e67d96fd2c998088e09ac97ee483d364f96e957259223682bbbd9a960c8ac6ac8be625804654d4f2de10e9d0", @ANYRES32=r7, @ANYBLOB], 0x1c}}, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYRESDEC, @ANYBLOB="f0ccad3275aa6179e6d3bff2e26c470300c31460b382c50f9aebb5523fcd904ba61d6685b1005851c2b26a99685111bc23f3aafb7951806a3b6e0f6f3d080c9a18a4b463e2383f4a8a9f0cf4b7b8c7b245611a1a1591574f75c3beba559d4d68efc74bd6af8bf5e0f97b3a9a1c35977644e567f72a95baaf5a2902f1a9011ffb8683eb14c22f16aeab81f4a6dd81306e4d8dafa73a11b43ca2095f", @ANYBLOB="000427bd7000fbdbdf254500000008000300", @ANYRESOCT, @ANYBLOB="0c0099000500000055b3afd3f5f3000000"], 0x28}, 0x1, 0x0, 0x0, 0x14004010}, 0x200d0800) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r8, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000006c0)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r3, 0x0, &(0x7f0000000680)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)=""/102, 0x66}, {&(0x7f00000004c0)=""/12, 0xc}, {&(0x7f0000000500)=""/70, 0x46}], 0x3, &(0x7f00000005c0)=""/166, 0xa6}, 0x0, 0x10000, 0x0, {0x3}}, 0x6) sendfile(r4, r3, 0x0, 0x7fb) sendfile(r0, r3, 0x0, 0x100000001) 23:58:58 executing program 2: keyctl$read(0xb, 0x0, &(0x7f00000000c0)=""/43, 0x2b) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) timer_gettime(0x0, &(0x7f00000002c0)) timer_delete(0x0) r0 = syz_io_uring_complete(0x0) r1 = getegid() ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00'/16]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x0, r1}}, './file0\x00'}) r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x4, 0x80, 0x0, 0x0, 0x0, 0x405d, 0x80c, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x442, 0x0, 0x7, 0x0, 0x3, 0x0, 0x4, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r3, 0x0) write$bt_hci(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x6) fsetxattr$security_ima(r4, &(0x7f0000000080), &(0x7f0000000440)=ANY=[@ANYRES16=r3], 0x4, 0x0) capset(&(0x7f0000000240)={0x20080522}, &(0x7f0000000300)={0x800, 0x3, 0x7, 0xd7, 0x8000, 0x6}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0xf7, 0x0, 0x1, 0x2, 0x0, 0x10000, 0x2865, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x1}, 0x20, 0x2, 0x20, 0x8, 0x40, 0x3, 0x100, 0x0, 0x5000, 0x0, 0x5}, 0x0, 0x4, r3, 0x2) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpeername(r3, &(0x7f0000000540)=@nfc_llcp, &(0x7f0000000380)=0x80) timer_delete(0x0) timer_create(0x4, &(0x7f0000000280)={0x0, 0x8, 0x0, @thr={&(0x7f0000000480)="f6ab21638ba7bb93012d9ed63271ea093acd5b7e8d308407e7ca3f5ecb5efa685a6775d3c446cac410df36aa074d1302bcae499c29cae1ccf4b28375596e1059923011662eac3b5511aea67156f163961d3497557ac51445784abdff669bc7a6bc6aec1faecd4c1cc50f664f7363d2a38737f99a4fad401283b1ca11a8e1cb550d0e2c4f9a91d31bbf6100ba3e4aa07f6bcccaeb2e8220bf568e83e14cdd3fe6da539d66b60ff0", &(0x7f0000000180)="22d9df2388ac23"}}, &(0x7f0000000340)) 23:58:58 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:58 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc376525038"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:58 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:58:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 20) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) [ 1490.114743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10134 comm=syz-executor.5 [ 1490.131964] loop5: detected capacity change from 0 to 16776704 [ 1490.140002] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10137 comm=syz-executor.0 [ 1490.148741] loop1: detected capacity change from 0 to 16776704 [ 1490.159726] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1490.159726] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1490.159726] [ 1490.169777] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1490.169777] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1490.169777] 23:58:58 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) fallocate(0xffffffffffffffff, 0x30, 0xffffffffffffff75, 0x10001) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRESDEC=r1], 0x24}}, 0x10) mmap(&(0x7f0000fee000/0xf000)=nil, 0xf000, 0x4, 0x40010, r0, 0x93f5b000) umount2(&(0x7f00000006c0)='./file0\x00', 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x1800) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000280)) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)=0x14, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000001c80)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r5, "ce6e765f732580663ee20319cf5555dd"}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x000']) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xeecc}, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ap_ssid, 0x6, 0x0) 23:58:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {0x0}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1490.202725] loop0: detected capacity change from 0 to 16776704 [ 1490.216790] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1490.218146] FAULT_INJECTION: forcing a failure. [ 1490.218146] name failslab, interval 1, probability 0, space 0, times 0 [ 1490.220835] CPU: 1 PID: 10139 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1490.222326] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1490.224136] Call Trace: [ 1490.224719] dump_stack+0x107/0x167 [ 1490.225495] should_fail.cold+0x5/0xa [ 1490.226321] ? ext4_find_extent+0xa77/0xd70 [ 1490.227243] should_failslab+0x5/0x20 [ 1490.228059] __kmalloc+0x72/0x390 [ 1490.228831] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1490.229950] ext4_find_extent+0xa77/0xd70 [ 1490.230851] ext4_swap_extents+0x364/0x14c0 [ 1490.231778] ? mark_held_locks+0x9e/0xe0 [ 1490.232649] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1490.233837] ? trace_hardirqs_on+0x5b/0x180 [ 1490.234770] ? ext4_get_es_cache+0x620/0x620 [ 1490.235720] ext4_move_extents+0x19d5/0x3050 [ 1490.236706] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1490.237815] ? lock_release+0x680/0x680 [ 1490.238740] __ext4_ioctl+0x3048/0x4220 [ 1490.239593] ? ext4_reset_inode_seed+0x450/0x450 [ 1490.240605] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1490.241709] ? find_held_lock+0x2c/0x110 [ 1490.242639] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1490.243867] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1490.244969] ? do_vfs_ioctl+0x283/0x10d0 [ 1490.245833] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1490.246952] ? generic_block_fiemap+0x60/0x60 [ 1490.247933] ? lock_downgrade+0x6d0/0x6d0 [ 1490.248831] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1490.249886] ? wait_for_completion_io+0x270/0x270 [ 1490.250931] ? selinux_file_ioctl+0xb6/0x270 [ 1490.251862] ? __ext4_ioctl+0x4220/0x4220 [ 1490.252786] __x64_sys_ioctl+0x19a/0x210 [ 1490.253651] do_syscall_64+0x33/0x40 [ 1490.254457] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1490.255550] RIP: 0033:0x7fa3bc6a6b19 [ 1490.256345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1490.260277] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1490.261907] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1490.263451] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1490.264981] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1490.266715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 23:58:58 executing program 2: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x49}}, '.\x00'}) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, 0xfffffffffffffffe, 0x20) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) r1 = perf_event_open(&(0x7f00000001c0)={0x7, 0x80, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4303, 0x68000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000180)=[{0x0}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1f, 0x81, 0x4, 0x91, 0x0, 0x2, 0x8000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0xa}, 0x4064, 0xe5, 0x10001, 0x3, 0x80000000, 0x920000, 0x8bce, 0x0, 0x710, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r1, 0x3) [ 1490.268254] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1490.275518] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1490.275518] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1490.275518] 23:58:58 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc376525038"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1490.288701] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:58:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffffb) 23:58:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x22a) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x6) dup(r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r1, 0x0, 0x7fb) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x2b4, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_TX_RATES={0x1dc, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x88, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x1f, 0x2, [{0x3, 0x5}, {0x0, 0x6}, {0x5, 0x3}, {0x0, 0x2}, {0x5, 0x7}, {0x1, 0x8}, {0x1, 0xa}, {0x3, 0x7}, {0x2, 0x7}, {0x6, 0x5}, {0x1, 0xa}, {0x3, 0x6}, {0x4, 0x7}, {0x6, 0x6}, {0x6}, {0x1, 0x8}, {0x1, 0x6}, {0x2, 0x6}, {0x6}, {0x4}, {0x4}, {0x0, 0x9}, {0x5, 0x8}, {0x7, 0xa}, {0x1, 0xa}, {0x6, 0x5}, {0x7, 0x5}]}, @NL80211_TXRATE_LEGACY={0x16, 0x1, [0x3, 0x60, 0x60, 0x5, 0x24, 0x5, 0x59, 0xc, 0x1, 0x3, 0xb, 0x30, 0x16, 0x24, 0x5, 0x9, 0x6c, 0x36]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x2d, 0x2, [{0x2, 0x6}, {0x0, 0x3}, {0x0, 0x6}, {0x6, 0x9}, {0x3, 0x9}, {0x4, 0x5}, {0x3}, {0x5, 0x5}, {0x7, 0x8}, {0x5, 0x1}, {0x6, 0x8}, {0x0, 0x9}, {0x1, 0x4}, {0x5, 0x4}, {0x3, 0x4}, {0x2, 0x7}, {0x4, 0x3}, {0x3, 0x3}, {0x1, 0x1}, {0x4, 0x6}, {0x1, 0x4}, {0x5, 0x9}, {0x2, 0x7}, {}, {0x6, 0x6}, {0x6, 0x8}, {0x0, 0x9}, {0x1, 0x4}, {0x5, 0x3}, {0x4, 0x9}, {0x6, 0x8}, {0x2, 0x1}, {0x7, 0x3}, {0x4, 0x1}, {0x1, 0x4}, {0x7, 0x8}, {0x5, 0x1}, {0x2, 0x3}, {0x6, 0x9}, {0x2, 0x5}, {0x6, 0x4}]}, @NL80211_TXRATE_LEGACY={0x14, 0x1, [0x1, 0x2, 0x1, 0x30, 0x16, 0x16, 0xb, 0x18, 0x4, 0x1c, 0x48, 0x3, 0x1, 0xc, 0x0, 0x18]}]}, @NL80211_BAND_60GHZ={0x150, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x0, 0xfffd, 0x1, 0x6, 0x4, 0x6808, 0x3443]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x9, 0x9, 0xb550, 0x8001, 0x8000, 0xf6e9, 0x9]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7ff, 0x3, 0x0, 0x8, 0xff, 0x3, 0x8, 0x101]}}, @NL80211_TXRATE_HT={0x2d, 0x2, [{0x7, 0x9}, {0x1, 0x9}, {0x0, 0xa}, {0x4}, {0x0, 0x4}, {0x1, 0x2}, {0x2}, {0x4, 0x5}, {0x0, 0xa}, {0x1, 0x3}, {0x4}, {0x5, 0x2}, {0x1}, {0x7, 0xa}, {0x2, 0x3}, {0x6, 0x3}, {0x3, 0x2}, {0x0, 0xa}, {0x1, 0xa}, {0x3}, {0x4, 0x5}, {0x1, 0x8}, {0x6, 0x8}, {0x6, 0x9}, {0x2, 0x9}, {0x3, 0x4}, {0x0, 0x7}, {0x2, 0x5}, {0x1, 0x4}, {0x1}, {0x4, 0x5}, {0x2, 0x1}, {0x3, 0x2}, {0x5, 0x5}, {0x3, 0x1}, {0x6, 0x1}, {0x0, 0x5}, {0x1, 0x6}, {0x6, 0x2}, {0x1, 0x7}, {0x4, 0x3}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x2, 0x6, 0x4, 0x0, 0xfff, 0x1000, 0x101]}}, @NL80211_TXRATE_HT={0x24, 0x2, [{0x0, 0xa}, {0x4, 0x9}, {0x4, 0x7}, {0x6, 0x16}, {0x0, 0x8}, {0x3, 0x9}, {0x0, 0x4}, {0x1, 0x3}, {0x7, 0x9}, {0x6, 0x6}, {0x5, 0x5}, {0x1, 0x7}, {0x6, 0x4}, {0x6, 0x2}, {0x3, 0x9}, {0x0, 0x5}, {0x1, 0x4}, {0x7, 0x4}, {0x7, 0x9}, {0x1, 0x2}, {0x2, 0x5}, {0x2, 0x3}, {0x1, 0x3}, {0x6, 0x3}, {0x6, 0x5}, {0x7, 0x8}, {0x4, 0x9}, {0x3, 0x8}, {0x7, 0x3}, {0x1, 0x3}, {0x5, 0x5}, {0x2, 0x1}]}, @NL80211_TXRATE_HT={0x28, 0x2, [{0x2, 0x2}, {0x3, 0x2}, {0x1, 0x6}, {0x0, 0x3}, {0x3, 0x8}, {0x1, 0x7}, {0x7, 0xa}, {0x7, 0x5}, {0x2}, {0x7}, {0x7, 0x6}, {0x7, 0x5}, {0x0, 0x2}, {0x0, 0x7}, {0x0, 0x8}, {0x1, 0x5}, {0x7, 0x8}, {0x4, 0x5}, {0x1, 0x9}, {0x4, 0x6}, {0x2, 0x2}, {0x4, 0x3}, {0x4, 0x6}, {0x2, 0x6}, {0x1, 0x3}, {0x6, 0x7}, {0x7, 0x3}, {0x5, 0x4}, {0x6}, {0x1}, {0x5, 0x7}, {0x0, 0x2}, {0x4, 0x6}, {0x3, 0x4}, {0x2, 0x6}, {0x5, 0x8}]}, @NL80211_TXRATE_HT={0x3d, 0x2, [{0x5, 0x8}, {0x3, 0x7}, {0x5, 0x7}, {0x0, 0x6}, {0x7, 0xa}, {0x1, 0x3}, {0x6, 0x1}, {0x2, 0x3}, {0x6, 0x4}, {0x4, 0x4}, {0x6, 0x8}, {0x6}, {0x5, 0x6}, {}, {0x5, 0x2}, {0x0, 0x5}, {0x7, 0xa}, {0x4}, {0x3, 0x1}, {0x4, 0x5}, {}, {0x6, 0x5}, {0x0, 0x3}, {0x5, 0x7}, {0x0, 0xa}, {0x7, 0x1}, {0x5, 0x5}, {0x2, 0x1}, {}, {0x4, 0x8}, {0x5, 0x7}, {0x5, 0x5}, {}, {0x7}, {0x4, 0x9}, {0x3, 0x6}, {0x7, 0x1}, {0x6, 0x8}, {0x6, 0x3}, {0x7, 0x1}, {0x6}, {0x2, 0x3}, {0x7, 0x4}, {0x5}, {0x4, 0x6}, {0x0, 0x2}, {0x5, 0x3}, {0x5, 0x7}, {0x0, 0x5}, {0x7}, {0x6, 0x3}, {0x7, 0x4}, {0x7, 0x4}, {0x0, 0x4}, {0x7, 0xa}, {0x7, 0x4}, {0x2, 0x2}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x156e, 0x9, 0x2, 0x7, 0x7, 0xfffa, 0x85ab]}}, @NL80211_TXRATE_HT={0x2a, 0x2, [{0x5, 0x4}, {0x3, 0x7}, {0x7, 0x9}, {0x6, 0x1}, {0x5}, {0x0, 0x2}, {0x6, 0x1}, {0x0, 0x2}, {0x7, 0x8}, {0x2, 0x2}, {0x0, 0x5}, {0x6, 0x9}, {0x2, 0x3}, {0x2, 0x2}, {0x6}, {0x1, 0xa}, {0x5, 0x2}, {0x0, 0x4}, {0x5, 0x5}, {0x1}, {0x2, 0x5}, {0x5, 0x9}, {0x7, 0x9}, {0x5, 0x2}, {0x1, 0x9}, {0x4, 0x6}, {0x0, 0x4}, {0x2, 0x2}, {0x7}, {0x5, 0x8}, {0x7, 0x6}, {0x1, 0x6}, {0x1, 0xa}, {0x6, 0x2}, {0x2, 0x6}, {0x3, 0x1}, {0x4, 0x9}, {0x3, 0x8}]}]}]}, @NL80211_ATTR_TX_RATES={0xbc, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0xb8, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x15, 0x1, [0x48, 0x21, 0xb, 0x2, 0x48, 0x3, 0x3, 0x1, 0x12, 0xd74f1d138a601ee8, 0x36, 0x1, 0x9, 0xcf06d8ddea8f642d, 0x16, 0x48, 0x7]}, @NL80211_TXRATE_HT={0x4b, 0x2, [{0x7, 0x2}, {0x7, 0x3}, {0x1}, {0x6, 0x9}, {0x1, 0x7}, {0x5, 0x8}, {0x2, 0x5}, {0x2, 0x9}, {0x4, 0x3}, {0x2, 0xa}, {0x7, 0x3}, {0x3, 0x2}, {0x1, 0x8}, {0x4}, {}, {0x0, 0x2}, {0x0, 0x4}, {0x5, 0x9}, {0x4, 0x3}, {0x6}, {0x5, 0x5}, {0x5, 0x4}, {0x4, 0x7}, {0x5, 0x8}, {0x6, 0x8}, {0x4, 0x9}, {0x6, 0x1}, {0x7, 0x6}, {0x3, 0x1}, {}, {0x0, 0x9}, {0x3, 0x6}, {0x0, 0x4}, {0x3, 0x3}, {0x3}, {0x3, 0x8}, {0x0, 0x5}, {0x7, 0x6}, {0x6, 0x6}, {0x1, 0x8}, {0x5, 0x5}, {0x0, 0xa}, {0x6, 0x5}, {0x7, 0x5}, {0x1, 0x8}, {0x4, 0xa}, {0x1, 0x5}, {0x0, 0x8}, {0x0, 0x4}, {0x1, 0x8}, {0x4, 0x7}, {0x1}, {0x1, 0x6}, {0x1, 0x3}, {}, {0x2, 0x6}, {0x5, 0x2}, {0x4, 0x9}, {0x6, 0x5}, {0x2}, {0x7, 0xa}, {0x6, 0x9}, {0x0, 0x1}, {0x7, 0x2}, {0x1, 0x9}, {0x7, 0x9}, {0x0, 0x9}, {0x6, 0x4}, {0x6, 0x6}, {0x1, 0x8}, {0x2, 0x1}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x8, 0x7, 0xdd, 0x7f, 0x2, 0x0, 0x92b]}}, @NL80211_TXRATE_HT={0x1e, 0x2, [{0x3, 0x4}, {0x1, 0x3}, {0x6, 0x7}, {0x4, 0xa}, {0x6, 0x7}, {0x1, 0x5}, {0x7, 0x7}, {0x0, 0x4}, {0x3}, {0x7, 0x5}, {0x4, 0x6}, {0x5, 0x4}, {0x1, 0x8}, {0x6}, {0x3, 0x3}, {0x2, 0x8}, {0x7, 0x3}, {0x7, 0x2}, {0x2}, {0x1, 0x3}, {0x3, 0x9}, {0x0, 0xa}, {0x5, 0x9}, {0x6, 0x1}, {0x5}, {0x2, 0x9}]}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x30, 0x9, 0x48, 0x6c, 0x16, 0x36, 0x3, 0x24, 0xb, 0x60, 0x2, 0x8ad607b9e5d4162b, 0x1b]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x40}, 0x40) sendfile(r0, r1, 0x0, 0x100000001) [ 1490.319003] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:58:58 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1490.389544] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10169 comm=syz-executor.5 [ 1490.464864] loop1: detected capacity change from 0 to 16776704 [ 1490.476141] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1490.476141] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1490.476141] [ 1490.498068] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 23:59:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:59:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000080)='+', 0x1, 0x0) unlink(&(0x7f0000000180)='./file0\x00') openat(r1, &(0x7f00000000c0)='./file1\x00', 0x2e402, 0x104) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x200) write$binfmt_elf32(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x5b, 0x20, 0x81, 0x1ff, 0x3, 0x6, 0x1f, 0x79, 0x38, 0xbe, 0x20, 0x81, 0x20, 0x2, 0x6, 0x7, 0x200}, [{0x6474e551, 0xb990, 0x8, 0x5, 0x1, 0x3, 0x3, 0x47}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1658) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) sendfile(r0, r0, 0x0, 0xb9d) sendfile(r0, r2, 0x0, 0x100000001) 23:59:11 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:11 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc376525038"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffffe) 23:59:11 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b0735"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:11 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc376525038"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 21) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) [ 1502.869704] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10189 comm=syz-executor.0 [ 1502.885146] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10195 comm=syz-executor.5 [ 1502.887856] loop1: detected capacity change from 0 to 16776704 [ 1502.900348] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10193 comm=syz-executor.2 [ 1502.925779] loop0: detected capacity change from 0 to 16776704 23:59:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) [ 1502.942621] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1502.942621] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1502.942621] [ 1502.967911] loop5: detected capacity change from 0 to 16776704 [ 1502.974898] FAULT_INJECTION: forcing a failure. [ 1502.974898] name failslab, interval 1, probability 0, space 0, times 0 [ 1502.977656] CPU: 0 PID: 10199 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1502.979114] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1502.980881] Call Trace: [ 1502.981445] dump_stack+0x107/0x167 [ 1502.982231] should_fail.cold+0x5/0xa [ 1502.983053] ? ext4_find_extent+0xa77/0xd70 [ 1502.983966] should_failslab+0x5/0x20 [ 1502.984763] __kmalloc+0x72/0x390 [ 1502.985494] ext4_find_extent+0xa77/0xd70 [ 1502.986368] ? kfree+0xd7/0x340 [ 1502.987067] ext4_swap_extents+0x323/0x14c0 [ 1502.987993] ? ext4_get_es_cache+0x620/0x620 [ 1502.988924] ? down_write_nested+0xe4/0x160 [ 1502.989850] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1502.990948] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1502.992287] ext4_move_extents+0x19d5/0x3050 [ 1502.993317] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1502.994426] ? lock_release+0x680/0x680 [ 1502.995310] __ext4_ioctl+0x3048/0x4220 [ 1502.996178] ? ext4_reset_inode_seed+0x450/0x450 [ 1502.997184] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1502.998306] ? find_held_lock+0x2c/0x110 [ 1502.999199] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1503.000408] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1503.001519] ? do_vfs_ioctl+0x283/0x10d0 [ 1503.002407] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1503.003522] ? generic_block_fiemap+0x60/0x60 [ 1503.004471] ? lock_downgrade+0x6d0/0x6d0 [ 1503.005348] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1503.006384] ? wait_for_completion_io+0x270/0x270 [ 1503.007407] ? selinux_file_ioctl+0xb6/0x270 [ 1503.008342] ? __ext4_ioctl+0x4220/0x4220 [ 1503.009219] __x64_sys_ioctl+0x19a/0x210 [ 1503.010087] do_syscall_64+0x33/0x40 [ 1503.010889] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1503.011978] RIP: 0033:0x7fa3bc6a6b19 [ 1503.012762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1503.016653] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1503.018274] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1503.019783] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1503.021308] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1503.022820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1503.024338] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1503.031063] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1503.031063] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1503.031063] 23:59:11 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc376525038"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1503.081169] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1503.081169] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1503.081169] [ 1503.083804] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1503.115583] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1503.155639] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1503.159953] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10213 comm=syz-executor.2 23:59:11 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc376525038"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffffff000) 23:59:11 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:11 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b0735"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:11 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc376525038"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1503.332919] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10220 comm=syz-executor.5 23:59:11 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1503.407235] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10225 comm=syz-executor.2 [ 1503.425687] loop5: detected capacity change from 0 to 16776704 [ 1503.449028] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1503.449028] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1503.449028] [ 1503.449722] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10228 comm=syz-executor.0 [ 1503.516523] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:59:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 22) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:59:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7f8000000000) [ 1515.764133] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10239 comm=syz-executor.0 [ 1515.787146] loop0: detected capacity change from 0 to 16776704 23:59:24 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b0735"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:24 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:59:24 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:24 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b0735"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:24 executing program 2: signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x80000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000001c000a000900000000000000010000000100000003000000000000000101000000000000000000000000000000000000000000000000000000000000080000008a00000000000000006606000900000000000000ff0f0000000000003f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000"]) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)=ANY=[@ANYBLOB="18000004", @ANYRES16=r6, @ANYBLOB="010000006adec42b2c75fc0b280000000000"], 0x18}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000700)=ANY=[@ANYBLOB="c2d5cabe69d9", @ANYRES16, @ANYBLOB="018200000000000000000000000000000000f6f62f369fa061a7b0c3cc634fb90c482339edd6660ae4263260b1361512fdec7310cbeaa8ca75b1bf216113e67d96fd2c998088e09ac97ee483d364f96e957259223682bbbd9a960c8ac6ac8be625804654d4f2de10e9d0", @ANYRES32=r7, @ANYBLOB], 0x1c}}, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYRESDEC, @ANYBLOB="f0ccad3275aa6179e6d3bff2e26c470300c31460b382c50f9aebb5523fcd904ba61d6685b1005851c2b26a99685111bc23f3aafb7951806a3b6e0f6f3d080c9a18a4b463e2383f4a8a9f0cf4b7b8c7b245611a1a1591574f75c3beba559d4d68efc74bd6af8bf5e0f97b3a9a1c35977644e567f72a95baaf5a2902f1a9011ffb8683eb14c22f16aeab81f4a6dd81306e4d8dafa73a11b43ca2095f", @ANYBLOB="000427bd7000fbdbdf254500000008000300", @ANYRESOCT, @ANYBLOB="0c0099000500000055b3afd3f5f3000000"], 0x28}, 0x1, 0x0, 0x0, 0x14004010}, 0x200d0800) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r8, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000006c0)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r3, 0x0, &(0x7f0000000680)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)=""/102, 0x66}, {&(0x7f00000004c0)=""/12, 0xc}, {&(0x7f0000000500)=""/70, 0x46}], 0x3, &(0x7f00000005c0)=""/166, 0xa6}, 0x0, 0x10000, 0x0, {0x3}}, 0x6) sendfile(r4, r3, 0x0, 0x7fb) sendfile(r0, r3, 0x0, 0x100000001) 23:59:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x105142, 0x8b) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)=""/123) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r3, 0x0, 0x7fb) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0xf8, 0x1, 0x9, 0xff, 0x2, 0x2, 0x3b, 0x81, 0x277, 0x40, 0x1d6, 0x2, 0x5, 0x38, 0x1, 0x8001, 0xfbff, 0x8}, [{0x60000000, 0x8000, 0x3, 0x0, 0xffffffff, 0x432f, 0x2, 0x247c}], "1a1db2ca7ab04278a66a0873b1214edf8f2aff5e27ea510b9c2f15a4a1f03add5c052c33f8359c2dab81e0f9445979d128eadb4596cace6bf047c1ffd78a2f3931b6652dadfbc315298b26b7a750a7b604891916514f75f33ac1", ['\x00']}, 0x1d2) r5 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x183040) sendmsg$NL80211_CMD_START_P2P_DEVICE(r5, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x8001) sendfile(r0, r3, 0x0, 0x100000001) openat(r3, &(0x7f0000000040)='./file1\x00', 0x40000, 0x24) [ 1515.805511] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1515.805511] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1515.805511] [ 1515.819727] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10252 comm=syz-executor.5 23:59:24 executing program 2: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x24508) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x0) symlinkat(&(0x7f0000000400)='./file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') [ 1515.838724] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1515.845477] loop1: detected capacity change from 0 to 16776704 [ 1515.866014] loop5: detected capacity change from 0 to 16776704 [ 1515.867055] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1515.867055] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1515.867055] 23:59:24 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1515.889521] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1515.893760] FAULT_INJECTION: forcing a failure. [ 1515.893760] name failslab, interval 1, probability 0, space 0, times 0 [ 1515.896484] CPU: 1 PID: 10258 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1515.897941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1515.899652] Call Trace: [ 1515.900196] dump_stack+0x107/0x167 [ 1515.900940] should_fail.cold+0x5/0xa [ 1515.901737] ? create_object.isra.0+0x3a/0xa30 [ 1515.902682] should_failslab+0x5/0x20 [ 1515.903458] kmem_cache_alloc+0x5b/0x310 [ 1515.904299] create_object.isra.0+0x3a/0xa30 [ 1515.905195] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1515.906245] __kmalloc+0x16e/0x390 [ 1515.907012] ext4_find_extent+0xa77/0xd70 [ 1515.907868] ? kfree+0xd7/0x340 [ 1515.908574] ext4_swap_extents+0x323/0x14c0 [ 1515.909483] ? do_blk_trace_setup+0xa58/0xc10 [ 1515.910457] ? ext4_get_es_cache+0x620/0x620 [ 1515.911364] ? down_write_nested+0xe4/0x160 [ 1515.912288] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1515.913328] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1515.914539] ext4_move_extents+0x19d5/0x3050 [ 1515.915491] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1515.916565] ? lock_release+0x680/0x680 [ 1515.917417] __ext4_ioctl+0x3048/0x4220 [ 1515.918240] ? ext4_reset_inode_seed+0x450/0x450 [ 1515.919221] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1515.920302] ? find_held_lock+0x2c/0x110 [ 1515.921150] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1515.922372] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1515.923469] ? do_vfs_ioctl+0x283/0x10d0 [ 1515.924313] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1515.925414] ? generic_block_fiemap+0x60/0x60 [ 1515.926360] ? lock_downgrade+0x6d0/0x6d0 [ 1515.927213] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1515.928214] ? wait_for_completion_io+0x270/0x270 [ 1515.929218] ? selinux_file_ioctl+0xb6/0x270 [ 1515.930157] ? __ext4_ioctl+0x4220/0x4220 [ 1515.931024] __x64_sys_ioctl+0x19a/0x210 [ 1515.931855] do_syscall_64+0x33/0x40 [ 1515.932615] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1515.933672] RIP: 0033:0x7fa3bc6a6b19 [ 1515.934441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.934782] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1515.934782] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1515.934782] [ 1515.938241] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:59:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 23:59:24 executing program 3: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x114, &(0x7f0000000180)=0x1, 0x0, 0x4) r3 = syz_io_uring_complete(r1) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000200)={0x42}, &(0x7f0000000240)='./file1\x00', 0x18, 0x0, 0x12345}, 0x0) io_uring_enter(r0, 0x1, 0x1, 0x1, 0x0, 0x0) r4 = syz_io_uring_complete(r1) syz_io_uring_setup(0x5e4e, &(0x7f0000000480), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000080)=0x0) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r5, r6, &(0x7f0000000180)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r7, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000040)=@IORING_OP_STATX={0x15, 0x6, 0x0, r3, &(0x7f0000000280), &(0x7f0000000000)='./file1\x00', 0x8, 0x6000}, 0x1) close(r4) fcntl$setlease(r4, 0x400, 0x1) 23:59:24 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81", 0x28}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1515.938263] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1515.938275] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1515.938286] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.938298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1515.938309] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 23:59:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) [ 1515.986836] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 23:59:24 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:24 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x2, 0x0, 0x1004, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 1516.118137] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10284 comm=syz-executor.0 [ 1516.185131] loop0: detected capacity change from 0 to 16776704 [ 1516.244704] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1516.244704] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1516.244704] [ 1516.303935] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:59:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 23) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:59:38 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81", 0x28}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:59:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 23:59:38 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b0735"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:38 executing program 3: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b0735"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xbe76f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000340)=""/234, &(0x7f0000000080)=0xea) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) syz_io_uring_setup(0x21, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x2000}, 0x4) syz_open_dev$vcsu(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r2, 0x0) bind$packet(r3, &(0x7f0000000100)={0x11, 0x1a, r1, 0x1, 0x1, 0x6, @broadcast}, 0x14) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x4}}, './file1\x00'}) r5 = socket(0x0, 0x6, 0xde5) sendmsg$inet6(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, 0x4) 23:59:38 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1530.465069] loop1: detected capacity change from 0 to 16776704 [ 1530.467146] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10301 comm=syz-executor.3 [ 1530.471476] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1530.471476] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1530.471476] [ 1530.487980] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1530.490506] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10313 comm=syz-executor.5 [ 1530.495512] loop3: detected capacity change from 0 to 16776704 [ 1530.504044] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10311 comm=syz-executor.0 [ 1530.509996] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1530.509996] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1530.509996] [ 1530.530057] loop5: detected capacity change from 0 to 16776704 [ 1530.550224] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 23:59:39 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1530.557577] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1530.557577] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1530.557577] [ 1530.570020] loop0: detected capacity change from 0 to 16776704 [ 1530.593798] loop1: detected capacity change from 0 to 16776704 23:59:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) [ 1530.601911] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1530.601911] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1530.601911] [ 1530.615988] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1530.625941] FAULT_INJECTION: forcing a failure. [ 1530.625941] name failslab, interval 1, probability 0, space 0, times 0 [ 1530.627536] CPU: 1 PID: 10321 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1530.628153] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1530.628355] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1530.628360] Call Trace: [ 1530.628377] dump_stack+0x107/0x167 [ 1530.628390] should_fail.cold+0x5/0xa [ 1530.628403] ? ext4_find_extent+0xa77/0xd70 [ 1530.628415] should_failslab+0x5/0x20 [ 1530.628426] __kmalloc+0x72/0x390 [ 1530.628440] ext4_find_extent+0xa77/0xd70 [ 1530.628451] ? kfree+0xd7/0x340 [ 1530.628466] ext4_swap_extents+0x323/0x14c0 [ 1530.628487] ? ext4_get_es_cache+0x620/0x620 [ 1530.628500] ? down_write_nested+0xe4/0x160 [ 1530.628511] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1530.628524] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1530.628539] ext4_move_extents+0x19d5/0x3050 [ 1530.628580] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1530.638449] ? lock_release+0x680/0x680 [ 1530.638942] __ext4_ioctl+0x3048/0x4220 [ 1530.639417] ? ext4_reset_inode_seed+0x450/0x450 [ 1530.639972] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1530.640560] ? find_held_lock+0x2c/0x110 [ 1530.641045] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1530.641734] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1530.642340] ? do_vfs_ioctl+0x283/0x10d0 [ 1530.642801] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1530.643413] ? generic_block_fiemap+0x60/0x60 [ 1530.643905] ? lock_downgrade+0x6d0/0x6d0 [ 1530.644394] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1530.644955] ? wait_for_completion_io+0x270/0x270 [ 1530.645515] ? selinux_file_ioctl+0xb6/0x270 [ 1530.646029] ? __ext4_ioctl+0x4220/0x4220 [ 1530.646515] __x64_sys_ioctl+0x19a/0x210 [ 1530.647006] do_syscall_64+0x33/0x40 [ 1530.647437] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1530.648000] RIP: 0033:0x7fa3bc6a6b19 [ 1530.648432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1530.650564] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1530.651455] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1530.652234] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1530.653073] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1530.653858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1530.654699] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1530.656133] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1530.656133] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1530.656133] [ 1530.707868] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:59:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81", 0x28}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:59:39 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:39 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:53 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8000000000000) 23:59:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 24) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:59:53 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:53 executing program 2: r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x6c75, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x402}, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x10, 0x30, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_FALLOCATE={0x11, 0x1, 0x0, @fd, 0x4, 0x0, 0x9, 0x0, 0x0, {0x0, r3}}, 0x200) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x4004, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0xbf31) r4 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$FIOCLEX(r4, 0x5451) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0005daed010d58efca5606142b7684acc194aec21cb1bdad2db75f34db5e0212fa866035729354d71dcc1f0d512f7733e70fb2d4631cffff"], 0x38) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000003080)={0x0, "1aaaa8aae701d5ca00"}) syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x2, 0x1) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendto(r5, &(0x7f0000000540)="88be5d6641087089c4730608e3169c2f5aa0a80e6f6252bb9cdd8dd6058d6ac9a57161cbadc88ab3a50042c96bf5d7f90ce98b23e578baa86c69cf49bb138c81b9c08068197c225d338f2bac53ca583b1a4afdfce5a0922d01207ae033d6863bef66e6d753bb7383ab33da64d91fe9477e", 0x71, 0x8000, &(0x7f00000005c0)=@ll={0x11, 0x3, 0x0, 0x1, 0x3f, 0x6, @local}, 0x80) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 23:59:53 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a9", 0x3c}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:59:53 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b0735"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1545.157562] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10363 comm=syz-executor.0 [ 1545.164651] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10357 comm=syz-executor.5 [ 1545.170929] loop1: detected capacity change from 0 to 16776704 23:59:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10000000000000) [ 1545.202830] loop3: detected capacity change from 0 to 16776704 [ 1545.209961] FAULT_INJECTION: forcing a failure. [ 1545.209961] name failslab, interval 1, probability 0, space 0, times 0 [ 1545.212684] CPU: 1 PID: 10366 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1545.214161] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1545.215929] Call Trace: [ 1545.216501] dump_stack+0x107/0x167 [ 1545.217283] should_fail.cold+0x5/0xa [ 1545.218098] ? create_object.isra.0+0x3a/0xa30 [ 1545.219078] should_failslab+0x5/0x20 [ 1545.219888] kmem_cache_alloc+0x5b/0x310 [ 1545.220764] create_object.isra.0+0x3a/0xa30 [ 1545.221698] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1545.222783] __kmalloc+0x16e/0x390 [ 1545.223559] ext4_find_extent+0xa77/0xd70 [ 1545.224445] ? kfree+0xd7/0x340 [ 1545.225157] ext4_swap_extents+0x323/0x14c0 [ 1545.226102] ? ext4_get_es_cache+0x620/0x620 [ 1545.227055] ? down_write_nested+0xe4/0x160 [ 1545.227983] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1545.229081] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1545.230318] ext4_move_extents+0x19d5/0x3050 [ 1545.231325] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1545.232454] ? lock_release+0x680/0x680 [ 1545.233331] __ext4_ioctl+0x3048/0x4220 [ 1545.234195] ? ext4_reset_inode_seed+0x450/0x450 [ 1545.235221] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1545.236350] ? find_held_lock+0x2c/0x110 [ 1545.237238] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1545.238459] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1545.239572] ? do_vfs_ioctl+0x283/0x10d0 [ 1545.240437] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1545.241553] ? generic_block_fiemap+0x60/0x60 [ 1545.242507] ? lock_downgrade+0x6d0/0x6d0 [ 1545.243405] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1545.244439] ? wait_for_completion_io+0x270/0x270 [ 1545.245483] ? selinux_file_ioctl+0xb6/0x270 [ 1545.246434] ? __ext4_ioctl+0x4220/0x4220 [ 1545.247339] __x64_sys_ioctl+0x19a/0x210 [ 1545.248218] do_syscall_64+0x33/0x40 [ 1545.249018] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1545.250119] RIP: 0033:0x7fa3bc6a6b19 [ 1545.250928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1545.251923] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1545.251923] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1545.251923] [ 1545.254871] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1545.254893] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1545.254914] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1545.254926] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1545.254937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1545.254949] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1545.270683] loop5: detected capacity change from 0 to 16776704 [ 1545.277110] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1545.277110] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1545.277110] [ 1545.290744] loop0: detected capacity change from 0 to 16776704 [ 1545.301770] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1545.301770] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1545.301770] 23:59:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x20000000000000) [ 1545.336163] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1545.336163] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1545.336163] [ 1545.369051] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1545.369199] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1545.373147] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1545.398080] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 23:59:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a9", 0x3c}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 23:59:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10000000000000) 23:59:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 23:59:54 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:54 executing program 3: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x0, 0x300, 0x70bd27, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'geneve0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x4800}, 0x8014) ppoll(&(0x7f00000005c0)=[{}], 0x1f, &(0x7f0000000600)={0x0, 0x3938700}, 0x0, 0x0) 23:59:54 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:54 executing program 2: r0 = syz_io_uring_setup(0x26c6, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x4007, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, 0x0, &(0x7f00000002c0)) syz_io_uring_setup(0x368c, &(0x7f0000000180), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r4, &(0x7f0000000000)=""/46, 0x1a, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040)=0x4, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000680)=@IORING_OP_WRITEV={0x2, 0x4, 0x2004, @fd, 0x8000, &(0x7f00000004c0)=[{&(0x7f0000000400)="083173d647b733275c05c4d4db12909ff412736a365d9bf08f6916ac286a9b7891f216bb2a6f07146ec4044d9c0401f5786b61377b2bed557f53479a3137e51ba480c26cd0846ba4072d35f51d3e21e865737fe06ce0980042d5f85f5f7831eca4dc17be167fd9ac4575ffcabe84d3a62e72f1a3b0ba0997ffb37af84b15b771412e2fe1ed34d709104423ed90efac34703f869f985ab3c88ad4694f293db5", 0x9f}, {&(0x7f0000000280)}, {&(0x7f0000000580)="3329f37089284155f4f9097cd54c06fe4165ca9c1b5b458619cba8ed9e8692f2c71d4de694ffb556ae31148f2f2d182c0f2054598f9df43b47acecfd78afa5b8a497f8e5f83379ebdd3bc9afdc5e602998d43ece88c55c695518bd100fce75cb050718e851a3bc374ba420dbe9cc131093a00c202c42339507c35aa131b58e8a72eb9ac3bbbb1662332d2854ef111f38c00d369a826b061d21bfb953cb9936d6ff9f63278e22d9f3cd13097ce5a9646300ab6ebb345f5b0066d1c07e6dd25d12903ae28702b238eb7497", 0xca}], 0x3, 0x17, 0x1, {0x1}}, 0x7) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x80, 0x0, 0x5e, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x6}, 0x5888, 0x7ff, 0x20000000, 0x0, 0x0, 0x10009, 0x0, 0x0, 0x24e, 0x0, 0x10000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 23:59:54 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1545.604919] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10398 comm=syz-executor.5 [ 1545.640202] loop5: detected capacity change from 0 to 16776704 [ 1545.654703] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10403 comm=syz-executor.0 [ 1545.663515] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1545.663515] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1545.663515] [ 1545.676791] loop0: detected capacity change from 0 to 16776704 [ 1545.696955] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1545.702772] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1545.702772] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1545.702772] 23:59:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 25) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 23:59:54 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 23:59:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c000, 0x108) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000140)=ANY=[@ANYBLOB="61e225fb465ba2c77f2835776706082c0a1ac5de000000000023140000000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x100010, r2, 0x39b78000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xfdef) creat(&(0x7f0000000000)='./file0\x00', 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(r1) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x8, 0xe0, 0x7, 0x0, 0x200, 0x80000, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6c7, 0x1, @perf_config_ext={0x2, 0xfffffffffffffffb}, 0x40040, 0x5, 0x5, 0x2, 0x4, 0x9, 0x8, 0x0, 0x51, 0x0, 0xffffffffea82196f}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x3a7b, &(0x7f0000000480)={0x0, 0x0, 0x24}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000080)) [ 1545.756187] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1545.921665] FAULT_INJECTION: forcing a failure. [ 1545.921665] name failslab, interval 1, probability 0, space 0, times 0 [ 1545.924178] CPU: 0 PID: 10417 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1545.925589] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1545.927265] Call Trace: [ 1545.927811] dump_stack+0x107/0x167 [ 1545.928542] should_fail.cold+0x5/0xa [ 1545.929306] ? ext4_find_extent+0xa77/0xd70 [ 1545.930169] should_failslab+0x5/0x20 [ 1545.930952] __kmalloc+0x72/0x390 [ 1545.931664] ext4_find_extent+0xa77/0xd70 [ 1545.932499] ? kfree+0xd7/0x340 [ 1545.933168] ext4_swap_extents+0x323/0x14c0 [ 1545.934055] ? ext4_get_es_cache+0x620/0x620 [ 1545.934956] ? down_write_nested+0xe4/0x160 [ 1545.935831] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1545.936854] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1545.937993] ext4_move_extents+0x19d5/0x3050 [ 1545.938947] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1545.940001] ? lock_release+0x680/0x680 [ 1545.940825] __ext4_ioctl+0x3048/0x4220 [ 1545.941636] ? ext4_reset_inode_seed+0x450/0x450 [ 1545.942598] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1545.943655] ? find_held_lock+0x2c/0x110 [ 1545.944487] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1545.945641] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1545.946681] ? do_vfs_ioctl+0x283/0x10d0 [ 1545.947504] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1545.948556] ? generic_block_fiemap+0x60/0x60 [ 1545.949455] ? lock_downgrade+0x6d0/0x6d0 [ 1545.950284] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1545.951253] ? wait_for_completion_io+0x270/0x270 [ 1545.952230] ? selinux_file_ioctl+0xb6/0x270 [ 1545.953107] ? __ext4_ioctl+0x4220/0x4220 [ 1545.953934] __x64_sys_ioctl+0x19a/0x210 [ 1545.954743] do_syscall_64+0x33/0x40 [ 1545.955534] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1545.956545] RIP: 0033:0x7fa3bc6a6b19 [ 1545.957279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1545.960953] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1545.962462] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1545.963891] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1545.965313] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1545.966729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1545.968161] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1558.181400] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10432 comm=syz-executor.0 00:00:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 00:00:06 executing program 3: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:06 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a9", 0x3c}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:00:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000052020000000000000000000021bd6d97619fd928b11b119dc10a000000e0342c93d90147af9a08000100a46946afd3242fe34c21bda50dd491007662c5ed09720afea4325a1fcf0a7ed9368501d68214d8f224d1d584d5d2ac8aa78ae60f30a20f1be7e7dfd0a11e3cf42a9292f09c4af2398266f7aea7425a958a04325c64ec8c5ded3979d94acac582afd981d8e27b2946acd4bf08e8abade28b83489b137b2fc139e2b4da7ebda51082b600097cadb5a6794b99a5919983954a157c9545c16af0bc484c91dffd328823e712a480a97ee8cf22bd4921294489fcdb15eb39e3039577f851982dafc273f0346ee85751830d1c3583e79282321da00e8adf367ed6bb95356bda7c14050b717c7d7d0e810194a70a0ba7f24e6f67e539d492a4901c7281a9", @ANYRES32], 0x1c}}, 0x0) 00:00:06 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:06 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 26) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) [ 1558.193658] loop0: detected capacity change from 0 to 16776704 [ 1558.194925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=594 sclass=netlink_route_socket pid=10434 comm=syz-executor.2 [ 1558.207975] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10437 comm=syz-executor.5 [ 1558.211605] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10433 comm=syz-executor.3 [ 1558.217945] loop1: detected capacity change from 0 to 16776704 [ 1558.229406] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=594 sclass=netlink_route_socket pid=10443 comm=syz-executor.2 [ 1558.233064] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1558.233064] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1558.233064] [ 1558.254670] loop5: detected capacity change from 0 to 16776704 [ 1558.276715] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 00:00:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_ima(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040), &(0x7f0000000080)=@sha1={0x1, "9fea2d742215065e9f8598247ad8322f18604aac"}, 0x15, 0x1) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000000c0)=""/15, &(0x7f0000000100)=0xf) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f00000003c0), 0x6811, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_user}, {@version_9p2000}, {@version_L}]}}) socket$inet(0x2, 0xa, 0x9) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r5, &(0x7f0000000080)='+', 0x1, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r5, 0x0, 0x488, &(0x7f00000002c0)={{0x8, @rand_addr=0x64010101, 0x4e23, 0x3, 'sed\x00', 0x6, 0x71, 0x67}, {@private=0xa010101, 0x4e22, 0x2004, 0x9d57, 0x80000001, 0x8001}}, 0x44) 00:00:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c5", 0x46}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:00:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf0ffffffffffff) [ 1558.282130] loop3: detected capacity change from 0 to 16776704 [ 1558.290473] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1558.290473] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1558.290473] [ 1558.311730] FAULT_INJECTION: forcing a failure. [ 1558.311730] name failslab, interval 1, probability 0, space 0, times 0 [ 1558.313153] CPU: 0 PID: 10451 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1558.313950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1558.314915] Call Trace: [ 1558.315234] dump_stack+0x107/0x167 [ 1558.315657] should_fail.cold+0x5/0xa [ 1558.316100] ? create_object.isra.0+0x3a/0xa30 [ 1558.316631] should_failslab+0x5/0x20 [ 1558.317072] kmem_cache_alloc+0x5b/0x310 [ 1558.317555] create_object.isra.0+0x3a/0xa30 [ 1558.317881] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1558.317881] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1558.317881] [ 1558.318065] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1558.318086] __kmalloc+0x16e/0x390 [ 1558.322352] ext4_find_extent+0xa77/0xd70 [ 1558.322834] ? kfree+0xd7/0x340 [ 1558.323230] ext4_swap_extents+0x323/0x14c0 [ 1558.323739] ? ext4_get_es_cache+0x620/0x620 [ 1558.324252] ? down_write_nested+0xe4/0x160 [ 1558.324759] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1558.325354] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1558.326020] ext4_move_extents+0x19d5/0x3050 [ 1558.326564] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1558.327171] ? lock_release+0x680/0x680 [ 1558.327654] __ext4_ioctl+0x3048/0x4220 [ 1558.328121] ? ext4_reset_inode_seed+0x450/0x450 [ 1558.328672] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1558.329277] ? find_held_lock+0x2c/0x110 [ 1558.329760] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1558.330425] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1558.331018] ? do_vfs_ioctl+0x283/0x10d0 [ 1558.331505] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1558.332112] ? generic_block_fiemap+0x60/0x60 [ 1558.332630] ? lock_downgrade+0x6d0/0x6d0 [ 1558.333108] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1558.333669] ? wait_for_completion_io+0x270/0x270 [ 1558.334230] ? selinux_file_ioctl+0xb6/0x270 [ 1558.334744] ? __ext4_ioctl+0x4220/0x4220 [ 1558.335230] __x64_sys_ioctl+0x19a/0x210 [ 1558.335702] do_syscall_64+0x33/0x40 [ 1558.336129] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1558.336730] RIP: 0033:0x7fa3bc6a6b19 [ 1558.337159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1558.339277] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1558.340154] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1558.340973] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1558.341790] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1558.342612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1558.343439] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1558.359904] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1558.359904] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1558.359904] [ 1558.444637] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 00:00:06 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1558.485965] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 00:00:07 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1558.507689] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1558.521387] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10466 comm=syz-executor.0 [ 1558.575188] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10468 comm=syz-executor.0 [ 1558.596998] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10470 comm=syz-executor.5 00:00:07 executing program 2: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) 00:00:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x100000000000000) 00:00:07 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b04"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1558.609717] loop5: detected capacity change from 0 to 16776704 [ 1558.623124] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1558.623124] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1558.623124] [ 1558.668569] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 00:00:23 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c5", 0x46}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:00:23 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) mknodat(r0, &(0x7f0000000c80)='./file1\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='[$\'{{%(,\x00', &(0x7f0000000180)='vfat\x00', &(0x7f0000000200)='$', &(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='\x00'], &(0x7f0000000340)=[&(0x7f0000000300)='\x00'], 0x800) 00:00:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x200000000000000) 00:00:23 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:23 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b04"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 27) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 00:00:23 executing program 3: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1574.507326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10490 comm=syz-executor.0 [ 1574.515666] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10489 comm=syz-executor.5 [ 1574.517246] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10495 comm=syz-executor.3 00:00:23 executing program 2: r0 = syz_io_uring_setup(0x498b, &(0x7f0000000400), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000003c0)=0x0, &(0x7f0000000000)=0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0xc6da2cc48daca113}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="73797a30bca46c9668264c0d71aef7e8951191be69b2540a117dff288b9fb040a4b0d27e312363e56577fc03ec29a035bc007e7dc14a0100000000000000e402d51f401f4e91583088d08100000013eef2854ea62827916883758f7036eeaddd76ef2f6a43bc21e5d54af53957188b74b9cc54db2543a904026e79707de44acd08000000be1d214eeeb070c8b240fa3dfefd66b3cdf936dcf54ee7e2a40cde5c4d539d06816c3e1f91faeb935bbc97a548e927834106369c37129af83ce087534652bce1f98d61bc847f2252f99178f981d7c75b1991e31e33897f1adc5cc932f52aa2a7d4c86683dcd844fad661f9d45b0c21251c45b706997fef5db488203e5ee623937efbfaef1edc2feeef31c6d47fd8a74682e542f0668976e02fb20c2c1c5198432662e094e807614a3351abee6b19c86276da4f730110933b95eef84350064fee92a9acbe674f428981559cb4912277a72e23"], 0xf3) syz_io_uring_setup(0x5e4e, &(0x7f0000000480), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000080)=0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r4, r5, &(0x7f0000000180)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r6, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) syz_io_uring_setup(0x5e4e, &(0x7f0000000480), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000080)=0x0) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r7, r8, &(0x7f0000000180)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r9, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) syz_io_uring_setup(0x8003a75, &(0x7f0000000080)={0x0, 0xa91f, 0x10, 0x0, 0x3be}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r11, r12, 0x0, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r10, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r12, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r13}}, 0x7ff) syz_io_uring_submit(r4, r8, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE={0x7, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, r13}}, 0x5) io_uring_enter(r0, 0x7643, 0x0, 0x0, 0x0, 0x0) [ 1574.544068] loop0: detected capacity change from 0 to 16776704 [ 1574.550761] loop1: detected capacity change from 0 to 16776704 [ 1574.555612] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1574.555612] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1574.555612] [ 1574.579051] loop3: detected capacity change from 0 to 16776704 [ 1574.592567] loop5: detected capacity change from 0 to 16776704 [ 1574.595788] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1574.602608] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1574.602608] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1574.602608] [ 1574.603950] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1574.603950] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1574.603950] [ 1574.610664] FAULT_INJECTION: forcing a failure. [ 1574.610664] name failslab, interval 1, probability 0, space 0, times 0 [ 1574.612431] CPU: 1 PID: 10506 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1574.613331] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1574.614381] Call Trace: [ 1574.614717] dump_stack+0x107/0x167 [ 1574.615186] should_fail.cold+0x5/0xa [ 1574.615682] ? ext4_find_extent+0xa77/0xd70 [ 1574.616227] should_failslab+0x5/0x20 [ 1574.616704] __kmalloc+0x72/0x390 [ 1574.617143] ext4_find_extent+0xa77/0xd70 [ 1574.617660] ? kfree+0xd7/0x340 [ 1574.618079] ext4_swap_extents+0x323/0x14c0 [ 1574.618643] ? ext4_get_es_cache+0x620/0x620 [ 1574.619199] ? down_write_nested+0xe4/0x160 [ 1574.619759] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1574.620402] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1574.621126] ext4_move_extents+0x19d5/0x3050 [ 1574.621720] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1574.622395] ? lock_release+0x680/0x680 [ 1574.622913] __ext4_ioctl+0x3048/0x4220 [ 1574.623422] ? ext4_reset_inode_seed+0x450/0x450 [ 1574.624031] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1574.624688] ? find_held_lock+0x2c/0x110 [ 1574.625212] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1574.625949] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1574.626608] ? do_vfs_ioctl+0x283/0x10d0 [ 1574.627122] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1574.627789] ? generic_block_fiemap+0x60/0x60 [ 1574.628354] ? lock_downgrade+0x6d0/0x6d0 [ 1574.628879] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1574.629501] ? wait_for_completion_io+0x270/0x270 [ 1574.630122] ? selinux_file_ioctl+0xb6/0x270 [ 1574.630686] ? __ext4_ioctl+0x4220/0x4220 [ 1574.631221] __x64_sys_ioctl+0x19a/0x210 [ 1574.631762] do_syscall_64+0x33/0x40 [ 1574.632226] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1574.632872] RIP: 0033:0x7fa3bc6a6b19 [ 1574.633337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1574.635676] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1574.636637] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1574.637099] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1574.637524] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1574.637533] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1574.637540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1574.637547] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1574.648484] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1574.648484] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1574.648484] 00:00:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x300000000000000) [ 1574.685160] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1574.689006] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 00:00:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c5", 0x46}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:00:23 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:23 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:23 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b04"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1574.794047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10523 comm=syz-executor.5 00:00:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x400000000000000) [ 1574.822606] loop5: detected capacity change from 0 to 16776704 [ 1574.829920] loop1: detected capacity change from 0 to 16776704 [ 1574.836650] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10530 comm=syz-executor.0 [ 1574.843002] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1574.843002] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1574.843002] [ 1574.863134] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1574.863134] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1574.863134] [ 1574.864844] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1574.868093] loop0: detected capacity change from 0 to 16776704 [ 1574.876569] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1574.876569] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1574.876569] [ 1574.894027] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1574.904529] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 00:00:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 28) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 00:00:36 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:36 executing program 3: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x500000000000000) 00:00:36 executing program 2: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x5e033, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000001000/0x4000)=nil], 0x0, 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(0xffffffffffffffff, 0x6628) mremap(&(0x7f0000004000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000003000/0x3000)=nil) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000040)) 00:00:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f1", 0x4b}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:00:36 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:36 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1587.789406] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10559 comm=syz-executor.0 [ 1587.795063] loop1: detected capacity change from 0 to 16776704 [ 1587.797685] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10550 comm=syz-executor.3 [ 1587.812387] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10560 comm=syz-executor.5 [ 1587.818908] loop0: detected capacity change from 0 to 16776704 [ 1587.836119] loop5: detected capacity change from 0 to 16776704 00:00:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x600000000000000) [ 1587.856152] loop3: detected capacity change from 0 to 16776704 [ 1587.861738] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1587.861738] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1587.861738] [ 1587.868397] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1587.868397] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1587.868397] [ 1587.871665] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1587.871665] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1587.871665] [ 1587.872025] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1587.872025] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1587.872025] [ 1587.887836] FAULT_INJECTION: forcing a failure. [ 1587.887836] name failslab, interval 1, probability 0, space 0, times 0 [ 1587.890966] CPU: 0 PID: 10565 Comm: syz-executor.4 Not tainted 5.10.246 #1 00:00:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c5", 0x46}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1587.892707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1587.894893] Call Trace: [ 1587.895572] dump_stack+0x107/0x167 [ 1587.896513] should_fail.cold+0x5/0xa [ 1587.897476] ? create_object.isra.0+0x3a/0xa30 [ 1587.898611] should_failslab+0x5/0x20 [ 1587.899566] kmem_cache_alloc+0x5b/0x310 [ 1587.900587] ? mark_held_locks+0x9e/0xe0 [ 1587.901604] create_object.isra.0+0x3a/0xa30 [ 1587.902686] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1587.903947] __kmalloc+0x16e/0x390 [ 1587.904833] ext4_find_extent+0xa77/0xd70 [ 1587.905867] ext4_swap_extents+0x364/0x14c0 [ 1587.906953] ? ext4_get_es_cache+0x620/0x620 [ 1587.908051] ? down_write_nested+0xe4/0x160 [ 1587.909110] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1587.910357] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1587.911762] ext4_move_extents+0x19d5/0x3050 [ 1587.912908] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1587.914197] ? lock_release+0x680/0x680 [ 1587.915208] __ext4_ioctl+0x3048/0x4220 [ 1587.916206] ? ext4_reset_inode_seed+0x450/0x450 [ 1587.917382] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1587.918677] ? find_held_lock+0x2c/0x110 00:00:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f1", 0x4b}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1587.919710] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1587.921196] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1587.922472] ? do_vfs_ioctl+0x283/0x10d0 [ 1587.923472] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1587.924777] ? generic_block_fiemap+0x60/0x60 [ 1587.925880] ? lock_downgrade+0x6d0/0x6d0 [ 1587.926901] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1587.928096] ? wait_for_completion_io+0x270/0x270 [ 1587.929293] ? selinux_file_ioctl+0xb6/0x270 [ 1587.930376] ? __ext4_ioctl+0x4220/0x4220 [ 1587.931398] __x64_sys_ioctl+0x19a/0x210 [ 1587.932411] do_syscall_64+0x33/0x40 [ 1587.933329] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1587.934594] RIP: 0033:0x7fa3bc6a6b19 [ 1587.935678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1587.940280] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1587.942171] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1587.943920] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1587.945681] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1587.947446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1587.949215] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1587.983621] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1587.985852] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1587.990214] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1587.992985] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 00:00:36 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1588.109039] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10583 comm=syz-executor.0 00:00:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x700000000000000) 00:00:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 29) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 00:00:50 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b04"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:50 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:50 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:50 executing program 3: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f1", 0x4b}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:00:50 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1602.341756] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10593 comm=syz-executor.5 [ 1602.348370] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10597 comm=syz-executor.3 00:00:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x900000000000000) [ 1602.364921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10600 comm=syz-executor.0 [ 1602.370923] loop5: detected capacity change from 0 to 16776704 [ 1602.377550] loop3: detected capacity change from 0 to 16776704 [ 1602.389656] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1602.389656] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1602.389656] [ 1602.394535] loop0: detected capacity change from 0 to 16776704 [ 1602.402460] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1602.402460] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1602.402460] [ 1602.407509] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1602.407509] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1602.407509] [ 1602.423620] FAULT_INJECTION: forcing a failure. [ 1602.423620] name failslab, interval 1, probability 0, space 0, times 0 [ 1602.426219] CPU: 0 PID: 10608 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1602.427697] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1602.429466] Call Trace: [ 1602.430036] dump_stack+0x107/0x167 [ 1602.430814] should_fail.cold+0x5/0xa [ 1602.431629] ? create_object.isra.0+0x3a/0xa30 [ 1602.432604] should_failslab+0x5/0x20 [ 1602.433415] kmem_cache_alloc+0x5b/0x310 [ 1602.434281] ? mark_held_locks+0x9e/0xe0 [ 1602.435148] create_object.isra.0+0x3a/0xa30 [ 1602.436088] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1602.437165] __kmalloc+0x16e/0x390 [ 1602.437933] ext4_find_extent+0xa77/0xd70 [ 1602.438819] ext4_swap_extents+0x364/0x14c0 [ 1602.439751] ? ext4_get_es_cache+0x620/0x620 [ 1602.440694] ? down_write_nested+0xe4/0x160 [ 1602.441604] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1602.442685] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1602.443889] ext4_move_extents+0x19d5/0x3050 [ 1602.444874] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1602.445991] ? lock_release+0x680/0x680 [ 1602.446859] __ext4_ioctl+0x3048/0x4220 [ 1602.447716] ? ext4_reset_inode_seed+0x450/0x450 [ 1602.448724] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1602.449833] ? find_held_lock+0x2c/0x110 [ 1602.450709] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1602.451922] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1602.453024] ? do_vfs_ioctl+0x283/0x10d0 [ 1602.453896] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1602.455013] ? generic_block_fiemap+0x60/0x60 [ 1602.455974] ? lock_downgrade+0x6d0/0x6d0 [ 1602.456850] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1602.457868] ? wait_for_completion_io+0x270/0x270 [ 1602.458910] ? selinux_file_ioctl+0xb6/0x270 [ 1602.459841] ? __ext4_ioctl+0x4220/0x4220 [ 1602.460739] __x64_sys_ioctl+0x19a/0x210 [ 1602.461610] do_syscall_64+0x33/0x40 [ 1602.462405] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1602.462726] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1602.463486] RIP: 0033:0x7fa3bc6a6b19 [ 1602.463505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1602.463516] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1602.466751] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1602.469288] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1602.469300] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1602.469312] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1602.469323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1602.469340] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1602.473074] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 00:00:51 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:51 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1602.502926] loop1: detected capacity change from 0 to 16776704 [ 1602.573834] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10623 comm=syz-executor.0 [ 1602.577583] loop0: detected capacity change from 0 to 16776704 00:00:51 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b04"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2c", 0x4d}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1602.587682] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1602.587682] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1602.587682] [ 1602.598639] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1602.600824] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1602.600824] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1602.600824] 00:00:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xb00000000000000) 00:00:51 executing program 3: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:00:51 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1602.658679] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10632 comm=syz-executor.5 [ 1602.671406] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1602.685836] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10636 comm=syz-executor.3 00:00:51 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1602.736235] loop1: detected capacity change from 0 to 16776704 [ 1602.743392] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1602.743392] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1602.743392] [ 1602.754115] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10641 comm=syz-executor.0 [ 1602.764764] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1602.771829] loop3: detected capacity change from 0 to 16776704 [ 1602.782758] loop0: detected capacity change from 0 to 16776704 [ 1602.832804] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1602.832804] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1602.832804] [ 1602.843135] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1602.843135] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1602.843135] [ 1602.854096] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1602.893826] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 00:01:05 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b04"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:05 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:05 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2c", 0x4d}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:01:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 00:01:05 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0x0, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 30) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 00:01:05 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$sock_proto_private(r0, 0x89e9, &(0x7f0000000040)="f03b3c11e767f007cc219aa23401f0a0bbf163c7d67c9fd90cbf073b3c31507c5c19607a715737f4677ed59afc5d3be3432372d0da39") r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000180)={'tunl0\x00', 0x0, 0x80, 0x10, 0x5, 0x1, {{0x23, 0x4, 0x0, 0x0, 0x8c, 0x67, 0x0, 0x50, 0x2f, 0x0, @multicast2, @remote, {[@cipso={0x86, 0x34, 0xffffffffffffffff, [{0x0, 0xb, "fb2960a7f4a39ce40e"}, {0x1, 0xb, "7d41269f652c8963ba"}, {0x5, 0x2}, {0x7, 0x8, "9ea27e71c8fc"}, {0x7, 0xe, "84f9046a28d35047c2b9e1b5"}]}, @timestamp_addr={0x44, 0x14, 0x94, 0x1, 0x2, [{@remote, 0x6867}, {@broadcast, 0xf65}]}, @cipso={0x86, 0x30, 0x3, [{0x6, 0x4, "40c8"}, {0x0, 0xc, "83b977150713cfceac23"}, {0x1, 0xa, "4b149093bad66d7c"}, {0x5, 0x3, "ca"}, {0x2, 0xd, "1e66ff5dc0bf5e56ba76c5"}]}]}}}}}) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(r4, &(0x7f0000000240)={0x11, 0x8, r6, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xe4, 0x0, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xdb45b89de6619027}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x48010}, 0x24000000) r7 = syz_io_uring_complete(0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r9, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) sendfile(r2, r8, &(0x7f00000000c0)=0xd8, 0x2) r10 = signalfd4(r7, &(0x7f0000000000)={[0xff]}, 0x8, 0x80800) ioctl$HIDIOCAPPLICATION(r10, 0x4802, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 1616.531421] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10652 comm=syz-executor.5 [ 1616.554389] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10668 comm=syz-executor.0 [ 1616.564830] loop5: detected capacity change from 0 to 16776704 [ 1616.595030] loop1: detected capacity change from 0 to 16776704 [ 1616.606052] loop0: detected capacity change from 0 to 16776704 [ 1616.614033] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1616.614033] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1616.614033] [ 1616.617834] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1616.617834] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1616.617834] 00:01:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="d45397d0f3a36793e39c92e9e33c831d73a06d39aaf2c452716343361b00e1bc145cac7d16a1abc073133f278a35deec68b3811d422afbc1169a31b74b5113d94353d2f43056d32dcfdc1d9964259086304f6addc44b70ad5c1ed13fcdb31d17b5d1f1b2859a3bfc63db101c9ac3c1e60f1365542cda6d5178af0e3bf7e68abd1fbef60a6674647e087c276d628e24559b8d6c4c5eda7627290b40dac007b8cf818fcf79922195f3ff90aadd5b1e5e9b9ce0422395a857b20fac8edd182ef636728ebb3093a52a79a5a90411", 0x18, 0x8000}], 0x0, &(0x7f0000000180)) [ 1616.632670] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1616.632670] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1616.632670] 00:01:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2000000000000000) [ 1616.664747] FAULT_INJECTION: forcing a failure. [ 1616.664747] name failslab, interval 1, probability 0, space 0, times 0 [ 1616.666684] CPU: 0 PID: 10672 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1616.667652] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1616.668938] Call Trace: [ 1616.669415] dump_stack+0x107/0x167 [ 1616.670061] should_fail.cold+0x5/0xa [ 1616.670736] ? ext4_find_extent+0xa77/0xd70 [ 1616.671466] should_failslab+0x5/0x20 [ 1616.672103] __kmalloc+0x72/0x390 [ 1616.672604] ext4_find_extent+0xa77/0xd70 [ 1616.673201] ? __lock_acquire+0x1657/0x5b00 [ 1616.673819] ext4_ext_map_blocks+0x1c8/0x5880 [ 1616.674446] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1616.675176] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1616.675897] ? lock_acquire+0x197/0x470 [ 1616.676456] ? ext4_ext_release+0x10/0x10 [ 1616.677025] ? lock_release+0x680/0x680 [ 1616.677568] ? ext4_es_lookup_extent+0x485/0xa80 [ 1616.678215] ? lock_downgrade+0x6d0/0x6d0 [ 1616.678794] ? __lock_acquire+0xbb1/0x5b00 [ 1616.679550] ? down_read+0x10f/0x430 [ 1616.680132] ? down_write+0x160/0x160 [ 1616.680723] ? ext4_es_lookup_extent+0xc4/0xa80 [ 1616.681543] ext4_map_blocks+0x8e1/0x1910 [ 1616.682156] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1616.682793] ? lock_acquire+0x197/0x470 [ 1616.683363] ? create_empty_buffers+0xbc/0x640 [ 1616.684002] ? lock_release+0x680/0x680 [ 1616.684711] ? find_held_lock+0x2c/0x110 [ 1616.685430] _ext4_get_block+0x21e/0x570 [ 1616.686147] ? ext4_map_blocks+0x1910/0x1910 [ 1616.686919] ? create_empty_buffers+0x4a3/0x640 [ 1616.687753] ext4_move_extents+0x1bce/0x3050 [ 1616.688578] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1616.689492] ? lock_release+0x680/0x680 [ 1616.690090] __ext4_ioctl+0x3048/0x4220 [ 1616.690688] ? ext4_reset_inode_seed+0x450/0x450 [ 1616.691381] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1616.692095] ? find_held_lock+0x2c/0x110 [ 1616.692703] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1616.693525] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1616.694265] ? do_vfs_ioctl+0x283/0x10d0 [ 1616.694963] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1616.695800] ? generic_block_fiemap+0x60/0x60 [ 1616.696586] ? lock_downgrade+0x6d0/0x6d0 [ 1616.697287] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1616.698143] ? wait_for_completion_io+0x270/0x270 [ 1616.698890] ? selinux_file_ioctl+0xb6/0x270 [ 1616.699540] ? __ext4_ioctl+0x4220/0x4220 [ 1616.700113] __x64_sys_ioctl+0x19a/0x210 [ 1616.700829] do_syscall_64+0x33/0x40 [ 1616.701477] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1616.702230] RIP: 0033:0x7fa3bc6a6b19 [ 1616.702868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1616.705705] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1616.706809] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1616.708046] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1616.709277] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1616.710495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1616.711731] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1616.714975] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1616.747831] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1616.764861] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 00:01:05 executing program 3: r0 = semget$private(0x0, 0x2, 0xc) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x7ff}, {0x0, 0x3, 0x1400}], 0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000080)='+', 0x1, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0xa3) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)=ANY=[@ANYBLOB='gh\x00\x00', @ANYRES16=0x0, @ANYRESHEX=r0], 0x158}, 0x1, 0x0, 0x0, 0x4008080}, 0x9c4) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000180)=""/103) writev(r1, &(0x7f0000000280)=[{&(0x7f00000007c0)="08c08baab78868ce0e7b276e83f64d02059edc4edbfe6e3fa69a13e2f785ad479def81fc1b0af53339e4c20c1010f0af533e0da21eb9d24e17190a0835623360b0c7ca830876b5ab6125feb9f8a028ee216882a67207edeea9e4efd186ca6fccd105a6b7e3728c22381de76d9d9349643e51962339cdf65dd858e285724358a8aa0c3f60f8e1ee08373f274c348cc765c8412984cc215c231cea8e2296c404500b6a8c51203edaacdd3bfea635", 0xad}, {&(0x7f0000001a00)="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", 0x1d3}, {0x0}, {&(0x7f0000000a00)="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", 0x7bd}, {&(0x7f0000000700)}, {&(0x7f0000000240)="62b5b1705c148490a0c98b", 0xb}], 0x6) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="f87d19a72318022a2f4f68d691782f9d78f13f0b4ee1adefe1aba8729f3de25ab283745a6fbfcb0800000000000000cae86b3d280ee2810ed30f5978875a44dd8e1813b3e968a75e08ebda8352bdf16986479f2429"], 0x40) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r6, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000780)=0xe8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r4, &(0x7f0000000940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000900)={&(0x7f0000000500)=ANY=[@ANYBLOB="80000000", @ANYRES16=r6, @ANYBLOB="08002dbd7000ffdbdf250d0000002800018008000300000000000800030003000000140002006d6163766c616e30000000000000000044000180080003000100000008000100", @ANYRES32=r7, @ANYBLOB="1400020076657468305f746f5f6873720000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006e65747063693000000000000000000039ab34837421c103cbec7d2890987cfb088ae3448acb869ba25bbed5d5223f2982e45bdfc4171f1caa00e61502affcff5f5c0c1e4ef958a3d863f3d0d7df7448a1e5cf7a20b3cc9472d6dd2728cf14f024e007ca568073e73712205fba"], 0x80}, 0x1, 0x0, 0x0, 0x4040000}, 0x4) semget$private(0x0, 0x6, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x1c9) 00:01:05 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2c", 0x4d}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:01:05 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:05 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0x0, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1616.919960] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10693 comm=syz-executor.5 00:01:05 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1616.938949] loop5: detected capacity change from 0 to 16776704 [ 1616.952607] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1616.952607] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1616.952607] 00:01:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2103000000000000) [ 1616.972876] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 00:01:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 31) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 00:01:05 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b04"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1616.990393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10699 comm=syz-executor.0 [ 1616.996782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10704 comm=syz-executor.2 [ 1617.012714] loop1: detected capacity change from 0 to 16776704 [ 1617.030012] loop0: detected capacity change from 0 to 16776704 [ 1617.071928] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1617.071928] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1617.071928] [ 1617.078126] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1617.078126] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1617.078126] [ 1617.083762] FAULT_INJECTION: forcing a failure. [ 1617.083762] name failslab, interval 1, probability 0, space 0, times 0 [ 1617.085281] CPU: 0 PID: 10711 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1617.086055] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1617.087037] Call Trace: [ 1617.087358] dump_stack+0x107/0x167 [ 1617.087792] should_fail.cold+0x5/0xa [ 1617.088250] ? create_object.isra.0+0x3a/0xa30 [ 1617.088790] should_failslab+0x5/0x20 [ 1617.089244] kmem_cache_alloc+0x5b/0x310 [ 1617.089733] create_object.isra.0+0x3a/0xa30 [ 1617.090255] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1617.090883] __kmalloc+0x16e/0x390 [ 1617.091308] ext4_find_extent+0xa77/0xd70 [ 1617.091804] ? __lock_acquire+0x1657/0x5b00 [ 1617.092321] ext4_ext_map_blocks+0x1c8/0x5880 [ 1617.092862] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1617.093488] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1617.094070] ? lock_acquire+0x197/0x470 [ 1617.094559] ? ext4_ext_release+0x10/0x10 [ 1617.095031] ? lock_release+0x680/0x680 [ 1617.095481] ? ext4_es_lookup_extent+0x485/0xa80 [ 1617.096003] ? lock_downgrade+0x6d0/0x6d0 [ 1617.096495] ? __lock_acquire+0xbb1/0x5b00 [ 1617.096969] ? down_read+0x10f/0x430 [ 1617.097397] ? down_write+0x160/0x160 [ 1617.097814] ? ext4_es_lookup_extent+0xc4/0xa80 [ 1617.098340] ext4_map_blocks+0x8e1/0x1910 [ 1617.098803] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1617.099307] ? lock_acquire+0x197/0x470 [ 1617.099744] ? create_empty_buffers+0xbc/0x640 [ 1617.100271] ? lock_release+0x680/0x680 [ 1617.100707] ? find_held_lock+0x2c/0x110 [ 1617.101159] _ext4_get_block+0x21e/0x570 [ 1617.101606] ? ext4_map_blocks+0x1910/0x1910 [ 1617.102098] ? create_empty_buffers+0x4a3/0x640 [ 1617.102646] ext4_move_extents+0x1bce/0x3050 [ 1617.103179] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1617.103791] ? lock_release+0x680/0x680 [ 1617.104281] __ext4_ioctl+0x3048/0x4220 [ 1617.104756] ? ext4_reset_inode_seed+0x450/0x450 [ 1617.105279] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1617.105858] ? find_held_lock+0x2c/0x110 [ 1617.106356] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1617.106996] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1617.107601] ? do_vfs_ioctl+0x283/0x10d0 [ 1617.108078] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1617.108696] ? generic_block_fiemap+0x60/0x60 [ 1617.109212] ? lock_downgrade+0x6d0/0x6d0 [ 1617.109690] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1617.110227] ? wait_for_completion_io+0x270/0x270 [ 1617.110797] ? selinux_file_ioctl+0xb6/0x270 [ 1617.111301] ? __ext4_ioctl+0x4220/0x4220 [ 1617.111762] __x64_sys_ioctl+0x19a/0x210 [ 1617.112245] do_syscall_64+0x33/0x40 [ 1617.112661] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1617.113250] RIP: 0033:0x7fa3bc6a6b19 [ 1617.113683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1617.115802] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1617.116693] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1617.117478] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1617.118275] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1617.119099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1617.119876] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1617.139061] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1617.155472] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 00:01:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 32) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 00:01:19 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0x0, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 00:01:19 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:19 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca6", 0x4e}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:01:20 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b04"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:20 executing program 3: ptrace(0x11, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x11204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') syz_open_dev$hiddev(0x0, 0x0, 0x200200) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(0x0, 0x0, 0x0, r3, 0x1) mprotect(&(0x7f0000ff9000/0x7000)=nil, 0x7000, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/121, 0x79}, {&(0x7f0000000200)=""/246, 0xf6}], 0x2, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50cd584a35820000"], 0x0) io_submit(0x0, 0x4, &(0x7f0000000b00)=[0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0xffffffffffffffff, &(0x7f00000004c0)="34fadbe56bf5f5f4a8f0c5fd222d7d17636050f63c174f38d22a830c9e02a80d3dd5de1245a65ac29c0edca6aabd229af881ecefc211801b6c4ccff6ffe8bee1a04ca5dafc0b643af03a2b8abaa9bfbb1daec306861dd31c97d53cbad0620cb2d166b3692e451340254118fae14eb90eff1641cb14e833b0f7082ad5df207606b4b0a49b031428131640de12dda35e063b8e24e66eb3e3fdf5981f0ea3487cd79fa2759a7588a8fbb9c9f6c0c6a7e2b1ace2e305cc44457dbc76f0ee425333d182af83517633548ad9dd92471539dfaeda3028b2755a066bdf3c9d817d8db39d1419cdb2f8bcb6b69b8f22d4", 0xec, 0x2a781d25}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0xb, r1, &(0x7f0000000600)="ee6ead92307e4bbd0df553cd156bb0d7b6599064259ed25552b4f6477a0c79d83f279572c20025d90667e2f8bad99b98df333f8287ca6f1dcdf0779fa7937097048a8cd0e972b40e6df1b3f1157e34c2deb3a28f144dc0fd78bb0be79c69952a64dd612638e39c6842b6b5226f700bb2c7778ba7110a977b8260cca8df787dd80ec18594bbb4707db814", 0x8a, 0x0, 0x0, 0x1}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x4, 0x9a7, 0xffffffffffffffff, &(0x7f0000000a40)="9e910c01e8d2b9e0dd15fe5303b7382813a541a1090cd3e927e8d6de96291f8844193f0eff3a1582a658e35bb12c2e38bb3521ac07bff52b941243e933739d1cfa2a8f133c4719a70b88dd318681ba5532319c0e60a65025de959febc8cab1a5ec59a6ec5a76b2757465744c6033b20fab1014445bfdc8a731ab4e", 0x7b, 0x10001, 0x0, 0x3, r3}]) r4 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x290c00, 0x3) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x4e20, @local}}, 0x0, 0x0, 0x1, 0x0, "2c5039bf040556d99c0151b20448762fa31294f7c38827bd66ca2f0e3acfdd7f5c9bb649504b9a208ab08c60aee1060bf65397100445bc681c34a33c93e5e73435bd202fa9ae56dcd0b4488e64c2e8f2"}, 0xd8) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, &(0x7f0000000140)=0xff) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000100)) listen(r0, 0x0) getpgrp(0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000003700210c00000000000000000400020004000f00bb8e6c3d81f91d48878f326a77b5ea0616fc0582fa4977e0089e"], 0x18}}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e21, 0xfffffffd, @rand_addr=' \x01\x00', 0xaa7}, 0x1c) 00:01:20 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1631.485943] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10724 comm=syz-executor.5 [ 1631.495421] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10729 comm=syz-executor.2 [ 1631.499891] loop1: detected capacity change from 0 to 16776704 [ 1631.504859] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10733 comm=syz-executor.0 [ 1631.553936] loop0: detected capacity change from 0 to 16776704 00:01:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8004000000000000) [ 1631.570005] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1631.570005] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1631.570005] [ 1631.570607] loop5: detected capacity change from 0 to 16776704 [ 1631.603982] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1631.603982] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1631.603982] [ 1631.605709] FAULT_INJECTION: forcing a failure. [ 1631.605709] name failslab, interval 1, probability 0, space 0, times 0 [ 1631.610402] CPU: 0 PID: 10737 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1631.611891] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1631.613670] Call Trace: [ 1631.614248] dump_stack+0x107/0x167 [ 1631.615032] should_fail.cold+0x5/0xa [ 1631.615847] ? __es_insert_extent+0xed1/0x1370 [ 1631.616850] should_failslab+0x5/0x20 [ 1631.617659] kmem_cache_alloc+0x5b/0x310 [ 1631.618533] __es_insert_extent+0xed1/0x1370 [ 1631.619489] ? __es_tree_search.isra.0+0x1af/0x220 [ 1631.620549] ext4_es_cache_extent+0x2bc/0x420 [ 1631.621508] ? ext4_es_insert_extent+0xf10/0xf10 [ 1631.622537] ? mark_held_locks+0x9e/0xe0 [ 1631.623414] ? trace_hardirqs_on+0x5b/0x180 [ 1631.624335] ext4_cache_extents+0x13e/0x2d0 [ 1631.625289] ext4_find_extent+0x930/0xd70 [ 1631.626192] ext4_ext_map_blocks+0x1c8/0x5880 [ 1631.627175] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1631.628301] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1631.629437] ? lock_acquire+0x197/0x470 [ 1631.630302] ? ext4_ext_release+0x10/0x10 [ 1631.631193] ? lock_release+0x680/0x680 [ 1631.631672] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1631.631672] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1631.631672] [ 1631.632057] ? ext4_es_lookup_extent+0x485/0xa80 [ 1631.632086] ? lock_downgrade+0x6d0/0x6d0 [ 1631.637172] ? __lock_acquire+0xbb1/0x5b00 [ 1631.638093] ? down_read+0x10f/0x430 [ 1631.638882] ? down_write+0x160/0x160 [ 1631.639694] ? ext4_es_lookup_extent+0xc4/0xa80 00:01:20 executing program 2: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b04"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1631.640728] ext4_map_blocks+0x8e1/0x1910 [ 1631.641794] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1631.642753] ? lock_acquire+0x197/0x470 [ 1631.643606] ? create_empty_buffers+0xbc/0x640 [ 1631.644599] ? lock_release+0x680/0x680 [ 1631.645456] ? find_held_lock+0x2c/0x110 [ 1631.646343] _ext4_get_block+0x21e/0x570 [ 1631.647211] ? ext4_map_blocks+0x1910/0x1910 [ 1631.648170] ? create_empty_buffers+0x4a3/0x640 [ 1631.649188] ext4_move_extents+0x1bce/0x3050 [ 1631.650181] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1631.651298] ? lock_release+0x680/0x680 [ 1631.652176] __ext4_ioctl+0x3048/0x4220 [ 1631.653051] ? ext4_reset_inode_seed+0x450/0x450 [ 1631.654069] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1631.655190] ? find_held_lock+0x2c/0x110 [ 1631.656075] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1631.657310] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1631.658416] ? do_vfs_ioctl+0x283/0x10d0 [ 1631.659283] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1631.660408] ? generic_block_fiemap+0x60/0x60 [ 1631.661379] ? lock_downgrade+0x6d0/0x6d0 [ 1631.662268] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1631.663309] ? wait_for_completion_io+0x270/0x270 [ 1631.664351] ? selinux_file_ioctl+0xb6/0x270 [ 1631.665317] ? __ext4_ioctl+0x4220/0x4220 [ 1631.666211] __x64_sys_ioctl+0x19a/0x210 [ 1631.667084] do_syscall_64+0x33/0x40 [ 1631.667882] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1631.668991] RIP: 0033:0x7fa3bc6a6b19 [ 1631.669791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1631.673746] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1631.675372] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1631.676908] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1631.678448] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1631.679973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1631.681516] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 00:01:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) [ 1631.708072] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1631.717218] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1631.726615] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1631.741459] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10752 comm=syz-executor.2 00:01:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca6", 0x4e}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:01:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 00:01:20 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:20 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1631.942657] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10763 comm=syz-executor.0 [ 1631.980998] loop0: detected capacity change from 0 to 16776704 [ 1631.997111] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1631.997111] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1631.997111] [ 1632.029874] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 00:01:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x7, 0xfd, 0x3, 0x0, 0x5, 0x97400, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x2, 0x5, 0x6, 0x0, 0x0, 0x3, 0x153, 0x0, 0x2, 0x0, 0x5}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) openat(r0, &(0x7f0000000300)='./file0\x00', 0x400300, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x800000}]) io_uring_enter(r2, 0x6003, 0x22a8, 0x3, &(0x7f0000000080), 0x8) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000900)=ANY=[@ANYBLOB="00000000010000fd0201000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ec00000000008f84158e66f57946271acf69220bc43185f54423f543d654959c611bb55b7c162628836b9faec3f8b07d16e9bf78837fadddde1c5e840fc8bc73fc8b4083d65d619d388e865b458a5a9442109bf72cb6e052b1f9aeb5be528b234ab3391eca910a1ee90b77613b02ec2317336df82462b4bd867c764a939a20fe749b2bb340403b8ce86f89a9793e5b44ad401e2a890ec2b476910384959c273835a92faf72863775212c5b3c005ad3d7c7ade63bd57edd76af73f3bc4bfe8e6c9a97543c174f837ac99e437c57ee0ef3051469cde897f6fd9c95e6bb376dd55b0a5cf6d477cb5c9193f7b44256399db8b8dc9da2bf26a1eefb60f02f2368a847c722950547f55e8f927966e525f73beab871c836d4572f7003421d1a4100b09fab9d3f63c21b10ddfd33982e8eb77e2761f360b970baeac7aa89d98611fd09a30f2150c2"]) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000001c0)={0x0, {{0xa, 0x0, 0x0, @private1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="eb", 0x1}], 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32], 0x18}, 0x0) r5 = dup(r4) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b}, 0x0, 0x7fdfffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r5, 0x1, 0x10, &(0x7f0000000200)=0xbe7, 0x4) recvmmsg(r5, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'ip6erspan0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"]}) 00:01:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 00:01:33 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 33) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 00:01:33 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59ace89872c48427676b7bfcd2fde646e6a34e630cd7817187004bfb5d9df2b554d5f5779307a8dfa8fbd4a9746ff4e611952bb85b9819443a32325f93b507279310084e821b699d54c71ebc4016d3292ebfac66aa0f17592a1fe76dbf8238006d8cbacb7e7fec4ceb6eb2f8d4435f477872da1ff4fd", 0xeb}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca6", 0x4e}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:01:33 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:33 executing program 3: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000a40), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB='/\x00\x00 '], 0x14}}, 0x0) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r2, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x600c000}, 0x10088080) 00:01:33 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1645.203870] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10783 comm=syz-executor.5 [ 1645.207953] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10777 comm=syz-executor.0 [ 1645.210971] loop5: detected capacity change from 0 to 16776704 00:01:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfb2f000000000000) [ 1645.223757] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1645.223757] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1645.223757] [ 1645.235582] loop1: detected capacity change from 0 to 16776704 [ 1645.247050] loop0: detected capacity change from 0 to 16776704 [ 1645.252458] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1645.252458] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1645.252458] [ 1645.275501] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1645.275501] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1645.275501] [ 1645.290602] FAULT_INJECTION: forcing a failure. [ 1645.290602] name failslab, interval 1, probability 0, space 0, times 0 [ 1645.292186] CPU: 1 PID: 10798 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1645.293058] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1645.294088] Call Trace: [ 1645.294424] dump_stack+0x107/0x167 [ 1645.294879] should_fail.cold+0x5/0xa [ 1645.295335] ? create_object.isra.0+0x3a/0xa30 [ 1645.295893] should_failslab+0x5/0x20 [ 1645.296350] kmem_cache_alloc+0x5b/0x310 [ 1645.296864] create_object.isra.0+0x3a/0xa30 [ 1645.297404] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1645.298023] kmem_cache_alloc+0x159/0x310 [ 1645.298539] __es_insert_extent+0xed1/0x1370 [ 1645.299071] ? __es_tree_search.isra.0+0x1af/0x220 [ 1645.299672] ext4_es_cache_extent+0x2bc/0x420 [ 1645.300208] ? ext4_es_insert_extent+0xf10/0xf10 [ 1645.300799] ? mark_held_locks+0x9e/0xe0 [ 1645.301290] ? trace_hardirqs_on+0x5b/0x180 [ 1645.301815] ext4_cache_extents+0x13e/0x2d0 [ 1645.302332] ext4_find_extent+0x930/0xd70 [ 1645.302848] ext4_ext_map_blocks+0x1c8/0x5880 [ 1645.303402] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1645.304050] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1645.304683] ? lock_acquire+0x197/0x470 [ 1645.305180] ? ext4_ext_release+0x10/0x10 [ 1645.305688] ? lock_release+0x680/0x680 [ 1645.306174] ? ext4_es_lookup_extent+0x485/0xa80 [ 1645.306747] ? lock_downgrade+0x6d0/0x6d0 [ 1645.307249] ? __lock_acquire+0xbb1/0x5b00 [ 1645.307762] ? down_read+0x10f/0x430 [ 1645.308215] ? down_write+0x160/0x160 [ 1645.308672] ? ext4_es_lookup_extent+0xc4/0xa80 [ 1645.309252] ext4_map_blocks+0x8e1/0x1910 [ 1645.309760] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1645.310307] ? lock_acquire+0x197/0x470 [ 1645.310790] ? create_empty_buffers+0xbc/0x640 [ 1645.311350] ? lock_release+0x680/0x680 [ 1645.311829] ? find_held_lock+0x2c/0x110 [ 1645.312330] _ext4_get_block+0x21e/0x570 [ 1645.312837] ? ext4_map_blocks+0x1910/0x1910 [ 1645.313371] ? create_empty_buffers+0x4a3/0x640 [ 1645.313933] ext4_move_extents+0x1bce/0x3050 [ 1645.314501] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1645.315132] ? lock_release+0x680/0x680 [ 1645.315629] __ext4_ioctl+0x3048/0x4220 [ 1645.316116] ? ext4_reset_inode_seed+0x450/0x450 [ 1645.316690] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1645.317336] ? find_held_lock+0x2c/0x110 [ 1645.317837] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1645.318535] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1645.319163] ? do_vfs_ioctl+0x283/0x10d0 [ 1645.319654] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1645.320284] ? generic_block_fiemap+0x60/0x60 [ 1645.320828] ? lock_downgrade+0x6d0/0x6d0 [ 1645.321324] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1645.321906] ? wait_for_completion_io+0x270/0x270 [ 1645.322496] ? selinux_file_ioctl+0xb6/0x270 [ 1645.323038] ? __ext4_ioctl+0x4220/0x4220 [ 1645.323539] __x64_sys_ioctl+0x19a/0x210 [ 1645.324032] do_syscall_64+0x33/0x40 [ 1645.324484] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1645.325107] RIP: 0033:0x7fa3bc6a6b19 [ 1645.325556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1645.327772] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1645.328697] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1645.329563] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1645.330411] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1645.331260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1645.332115] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1645.336651] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1645.339689] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 00:01:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfbffffff00000000) 00:01:33 executing program 3: futex(0x0, 0x6, 0x40000000, &(0x7f0000000000)={0x77359400}, 0x0, 0x0) [ 1645.381329] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue 00:01:33 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1645.420575] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10812 comm=syz-executor.0 [ 1645.439068] loop0: detected capacity change from 0 to 16776704 [ 1645.455810] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1645.455810] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1645.455810] [ 1645.490142] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 00:01:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 34) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 00:01:48 executing program 3: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1660.349081] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10825 comm=syz-executor.5 00:01:48 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x4]}, 0x8) r1 = openat(r0, &(0x7f0000000340)='./file1\x00', 0x40283, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000017c0)=0x81, 0x8) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) fallocate(r3, 0x0, 0x0, 0x8000) r6 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000001c0)={0x0, r2, 0x2, 0x0, 0x8}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000140)='./file1\x00', 0x7, 0x1, &(0x7f0000000180)=[{&(0x7f0000000200)="5e6b01befa044b880a6b7985f367a7186c3dacc4ce19c1a30beda2c662083f322085cfd09bea5ab8d92a375f3903c99c5434294aec2353d454fdc3bec11e372847781170c2afeb26f53030cf06bd", 0x4e, 0x5c43}], 0x80, &(0x7f00000002c0)={[{@utf8no}, {@shortname_lower}, {@fat=@codepage={'codepage', 0x3d, '936'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) syz_io_uring_setup(0x8003a75, &(0x7f0000000080)={0x0, 0xa91f, 0x10, 0x0, 0x3be}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, 0x0, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r9, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r10}}, 0x7ff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001780)=@IORING_OP_WRITEV={0x2, 0x0, 0x2004, @fd_index=0x6, 0x17, &(0x7f0000001700)=[{&(0x7f0000000380)="07cbe0de7e9fecf7b797ba240b9aa38b95dd206d8b29b42e93b6cca9193900e4376a0709ef991756201a8343fd15af69b146daa1bcb97486c7fc", 0x3a}, {&(0x7f0000000400)="4963138cd31a757ba89451696d58b788388bf96c2ab6ba21ba46b2f9ddcc57102a12f64047ff6f93e2fe65b57bb35a93b4de4c98a116c0c456c4c3913e4881a1f64310fc1a3bf98e6a1dd2507e2a7b8ef1c31e253fe82a3b6350e8c899421d0b55c558f8bd20fa4af96e8545a4073dc42e454655b0cc1ae7fffc613811f85e0e0c81b22137c1bae0e43650fcb59b70baeedc2fa1671c383d1384857e327d3df3d2f1a814f1015283d4600a03aebd08084e7483564903c27dbf103c27eb", 0xbd}, {&(0x7f0000000580)="f93010d0044bdd0419e0933d3b18c9a69826180cd73cf87cf7e3d6725a2d937239393133d35333d5845a427282d83bdc7710f990d37898105f9262daa2ebe7d2c3ce783717b6b68622bc09cb58303cc17bba5b9385b3141cb7e338213bab42fd8ef99d4f3adf42e75254399f031296446fbda957fa38697139d778f46ff52d5c70ff65ea00960b03c9aa9e60e66fba1cc241b4592d4d0aa481bc37086c8a7c7b448e41eac3525a402cd88a1d6ded63f0652c78d5d5565c81c612a63cc14eb2fe2e4bb88980714bab384c12876783092cadb2f40c2d7c66b97c3317db25c5d503d454a422daf223acaeb17e5196cf39847cc94d534f5eb481185d356a8a64d83e75642b5508703f652c0effc2d5578005b8c1b4418ec6f4534afca9744975102ed943a8fc817b27d3f089df1a934da7ff0f340331fa67acc27076a2a65b19418af9a629f0cd5dd5b5cc36385497de853f43f3f697dfc74d19d837763289291b9407b6c126736331b308af9acfdc5fb7dca11a8f7b70a76b6b9b81e7ef6bad2bd04554f4135e032803898ff89377b3f3420bdab1acc4a153c47850729b5ef22c0480d5ce8774a3c9b339d325a4612412b5073dfa6ba17d731586dfd267eac5fe8e025c6dc0d445e93e7f2cc822ef1be267dc7be45a9f4136a26ffcdd50cfe925ff70bdaf0e47260ad1d64f849606a053c6c7f279e40a052e87fd977a1894b4db8e49d4c10b7449a8aef09da2d972c7290683bbbadb2222583e618e4611ba34658c876be3eb0348a7d8899bf95e0fba2ffe0b08e50f19bab93b5776071198d1407af0b748f5324cea80237a7a5063632190fe7dfc72f390da95c6085e23e38a6e7f6f54c4fbe2bccc66f96c74b14a52cfb3ba1fc299626bdf2997de21f4fd70d1f016d24d62cea37defc6ddf36ac7a789a3e03fe4c78bf7138795eb6a9b7f5f85b7118311c8637b287581811ccacb9ab4a8bedb68533b89bf809671f46150a422a1aea58c344be364c669c07fd579810a6e4babb367f83eb62316f82037171d7752664266e4f1ab44004c0d5dc4c08a05e7412417dd5b52cb8b8d0d58f020831c985409dd3c3665465b6087b4e706f8a441bbc1a99661d0cb6fc096da632825c558523c453b4d6dce908b7315ae95c360123f7b7710676902240ca1771e24e4be0452af2ac0023c6767ecd5c79ee1d155bd433d0a9853e7cd03de59e504b53ca196f42ad304e333f507a3c5ca347a63902740249552c2d6101763a2e0be275b81a9f7621c44148a3fcfb376f9b542a46fe125190347c97a65ee6668844e8409318349092fb22461addfbdce400279059ec8ab071af190b09400adf7b3a6f4e72ebb5e8001dcb66d3dc72f3141d1c00880c3bb3d20fddcb64f004750afea82a5524fc23fbe126a204240b30f8c97ea0b60832d17ee2a86446fbd51bea9bbb7ed8e85bd0fac8c802405045eb3b2ba15323823d54f757ebaa97acd3a32ee9fac0586a79d28817edb4b0e4a9b89b8ca7f0a8ca2d43696e57c83103d8d69c4e597bac2d1d0ee89be37713ad87490377ebe78ab85f6cc9335c531c464fe67ee5c52bd609f9105487ee1fc95bda1813358ccde432552af06f5273b725795ead68568e0f017922410989b69af9ab25c01f078575a8cb1dc7235fecdc59646bb889287831f5f996d0e3694b4fa8969e0b9e8b2a5993000457c2342fff773e81cf1238ce8840d1c6f03fdae5c178d6c22a9fef9c49ae9db211a63489596d4a651263e4192f8979509a0efa05aa616de3bbb77910c49328fa6074a0a7ea8d82b1daa0bf670c271073fe051a5aebaf03e6d8975556b964d612563e7153fa59c765314035e37d4e7c96284c0621f70e38db9086821b673d253518f7abd926e2543bcc1d0e7f75df3e43a1b8790c1835c4bea2d846f9ca104f6e7cbe51002fdc8e6cd815701da10008ed409ca9a0c8c24ecb34ef454f7fe1b603b9caa4ead6c56547be55b7d9237956197ea5362f5ccfdcbaa986b49c9f32f93093578029d8dbb3b2a7a25d4365bad3cdc9c74726635b16c0d596964dc40629da305621e62b8d9e24fe56e24533c8e5ad34a5f5738069b38b3506c861d0fc532b1c2c5d4be737a304de0d15a7a6d924bf8652eed87654a4ba00769e3b0731db199516a6a06480c7f62893f81c38f923cbf592bacb75d65a66c20231094386d79223071023aaf67e8f2147d5c8427f4cd620119545207d5cdb824d40bdffa8f25ea5f6177b21fb8343da48b0e730635111264f99bffd22134cf54abdb487a8a0bd364a2ccff7ed41bf4a5e472fe225e13a2734b0a16075b7b9987978a3afee5500452c37415d9c757da53fbfadb9f9c43e2b978f55df808df0c4564660a340bccf87d66d7723359678f9030250c9ac31e1dc86cea3d76014c72a8389d80bc5279d01162a636ca34195a6aac26c47cd267e622e75fb320595a15a7b14d68798f3d60c8729ac9909c850f38b84c7734a2e9424a5d2f835826d6313d5928b4071e6ebe2d64fcb31dab05d3338eec02100c8bbfcfe51f658fb2ed384a3ce51af390d8b9e39b2aa32a4682978fad0b94a255dd7c1fdece19c71b8a92f00d41f66d0315e7c64aafeb26ae26f4f6656603769099c6d900bb1dc8fdf3efb5369757a696dc195d6e7743d8fe3fdedb4a1c9eb982c9eb250a5087f0bc42a569fb50084b8384768a888bb0b27eaf909ce5ce5e21c748d4c4b5e2e4f867815f4374b26dadf2edd25c770a64833bc4a0dc2d5cc4fd1945e7800d275bcf7e439414ffcdc71090aae902d96fe7055dcfcecaa913ad804b26829aac6e325bb7e8674fbfa425dfdc0d04907194cb0a74d53f71254485fddb2728b42b6866c75b461e7a818240a6c7ac1eba4cfbbd3f945151571290836143fb0b33a0ca326489b95f3d976b2d65adb09122ed47d73e7101d3a76f8f21a94e6423183ad4313e63f9d30416ca1b5ad5079f42f39c4293f8696a634a88ae89b9fb7b16b4d11535724e2e5dda16da212729ea304306042a47607d2f36fa27eae35535440926d5a97e6a5f02ecdf540c33a4fa5d274500efd8ae5622c57f78fd19e68690dfda92858036d365a7c4c9ee47b1a7363c67029d2da426ea52e7b8a2bf0551ccf876dd85b80b184cb875d64e08ecaa894c0ca530eb73e97987feef2623331e350def774381f6566554e41193d14f78460ec148fab3913b63499b44c123bfc77c86cf8cd3ea801ba3d72f7890c9d3a48e8b9e9bbf2eebd64ea08e1c03c4e4758ba48972bf8c06f98af5924dd5da130d6dd9d795667ee4240c645be7ffcd94d37881a167319886a984f5d709b1e6af2d95b30464cdc473328b518dfebe431751fd7177f5696a2aa6c48bfe8fcdf77729e01367eec13b4682bd4add26e7ace7f9cf4fa895b6187faab91451eeb7c39c38d16fad511c2b16fa0c0e8182aae9b0c3d82b400c1c796a9f6464bced7b1300add040ca0140ac742d39ccaa3b5a870d8ba7f25a2f00901d5a5c82aa8e4e7fd862c0443b4edcc597e66368562f5918f412b5dad3fd627290dce4c98f4973ab9abda6c1bda2f5f211923b34b205d8dba6142e29f3baaf7b12d5b015b64837aef61c3e87ea53c8978b5d49ff9b2c91d6b153b1b6e66d1a03c3ffd61c689eadaeaee74efb8b8fcf8e5bd1a39da31398fb5dadb9dc0c324c4ee533e3b1893bc40dd125450d4dacdc06d7f7cec87ad5e4d80f6358fe1acbc014e3eeb40e9134c66a62d19df82eb789babb81b8540e60d2c902aac9ab45cc787b9a8319287742d4973d0ae71727e707b8eb271a4936fa3c1ce6b572a5a0ecb515fe1a11d629db57b188f2b7756ed40585e3cde9ec1245a6778e1761a15500738fdad20850a6cc6284713dcfaef78476600e4c9057a99471a4b41d6be71ae5cd472499d342bd6262fd12513afadac2d510c9b2a263418c625a312b9c815342222cc6773900fea14d8a83dc50952b90e854a1fd2798ce59083c00c214b564700bd3b0d816bed6ea357e803ba0be5c16598dec3c86d40b8fc2e0cce4f43e72ce10c5e4c12587ae36e4e874a3bc7b2406e6de8a497c7ff54a5e83d44dab149a20965d227bcffe410b9fb77c9deff799dafaabeb328e422a94f8aadfed76276bed4390b445774ba2e43be6d67083a041ab4a5c9fa7e77510770f696bb68c897f587f8e61701df252e7e0ec497c69760a6db028478a6b9fd5e81e6f0286642e6ad73e2f2ba859e87be03d1ea06e2ac990173bba11971ce5778d784a7d418d7843ad9df60bc761e14561570edc858c19383611e34231a854c5674c13c0eb7c7a07f63c40b02d165f50bd9f6307026b678394ee975aff43e43b58285a152bceaac52b2105aefe80d1261dd8e19ec00750044135a2ba13406cee2f022991361574bbbe89e96ad106161e7f3a5c9d72a5b1e168c1225720f5d88d87128afda2ccaf36d482f8b43a5e33c72cf955a012d4966862b821ba6b7b6b2bd3e1500b2e54d664b3ddbdaac14ef7e0d743a7912ee901b63a7b9e6157e31a5e3be09893904c8fd38dfa308f835870b1d484e08eb0c4d9355b5f57852f3997c736bfef50a17a8342ca819416fb99fdd39b528140a07f93e5f491fab1e4fd68494ea940c86a1a6f960892d63d2bc094274b25b6546559b45f4a66881e251197db827e3ec34f2b2d05ed4b10fd5307d22f1d19d4057760eb4f0c7b1f0e9a1929a5f7342e7b69a4c167f724c969624fe9b09edc9a98e4d9c52f3c8b2f523e552a6697c18dfe0aa72135d189593c8d56fecf512d157acb30f03791cf529c0c3448a281d96c883af4f9f3039587999120f379da1296664e38f8401e2823f6dbd32c8dd069f917b4c73906733668f9d12a52556052618babecb1edbe40caf931965a87a3b70f8b866d5bd0c6ff606087df92514323543c500b7196b96c85790c024dbb1058582d3ac55efacbb882d2552e7aa266ee3c8d3f98145e3c756cc6a53dc392cc46326fb6c8ea802985453f28309f4c843580b04c0b5b1be065317d24a0d00c36b5906de0eed80dded8c7f93b17647fbc6ec7ba2cc6369bb616939b69f2ddba4e8c1c5b69a6cbc28d3ca7c86783950ae215d59da53234d8a3b136618647c77729e85adb255c1d73cd3396f7b4209b8cbea69e138b24e05747b4cb8ae4e21b661b64ed00f74638e773d17f7fb26c850542e5e16ff3a1778de29aef86dc755c4ca23528c135f9fd236124d72276adf94966b108ba1f05cb7b3b16f17b3a3e18825889e398a11fa76f76a7ab9b0047b5dac200558231374ec491e9578055606d1a63cd20f708ff414518b220bfd840ca7ab465f86b02d12dc1b2ed73ed4dc0594d84b7f96ae216fdc73bfa202e159d1e9bd573d76158b87e24fcc8e79d23428fda2c1cc910fddcdfe91511f4b5d69552a59117444131b923336d355ef732d3df9b3facbe6835b009001d4a2c8f3467c5780ccfcdbcdafd8bc05487ed8cc5cfcce4b323de40b715c83d6a7aee61211a6e129de03cbf34dabc68d95551bc084cfc1d0afc69ed3eb829cea357b21f92b611397ff0696560e295446392df1999dc117d3a70604a13b4096eb2ab0451d6c626fb283ccd0d9bfb2839af91761677a014910bf3af1262403b9d0495537fd2390d69af6e03aec89256383fc943b7d048ea37b42f888f762a2b52591882e9a149da472cf9346f30003f606e3ba9fc9304cd9ae3ae7dad333bd8a1f81be644179f16b9a0e643a4569303bb0806f452c56f24c153e4ff5dcfb48945245d286e7cb593d2fe8158191c6f7298559a8b01b7235062fee945", 0x1000}, {&(0x7f00000004c0)}, {&(0x7f0000001580)="ef08b425ad7545897b3afe01490e46768a11d1cdf7f992be3f3e8484c47eb54599c715bc641b501933d42a4b1230a9a29cf81302f227a5c82e4d1dad0ce89a41a14f8cd46dcbb98bd1b796b47453dfe436f21c116f7060c59b4cd30b2ca423810a5b469c2ee6f392100d067d478cac1fe80c8a989d3e50e38318f36ab86ff66d45882a36122cd237a9063a3743988252cf203761ee9f29ce9c6efbf40079c90abf49f623564d2c1c959e7b31eeb80ded489f5f5ffe957c7d55bb6a682e24a084455e1faa8d4e344beb689cb2ffb613b7e996218230216e42837ee4c4fe037a63b3a2f49a7a49e7c2a86630", 0xeb}, {&(0x7f0000001680)="1b2e7cdd7ecee9cff7a01f7961185eb58a4b765a6341819e05c7f6554750345166db5fdc56747efbfafd83e51d14ff114a4097b8276feb92ce0596a1973c03e97b7d2c37eb584b3f486de244d2072afb46ba9751cea95498b8bc0c6f7ed6d14056d09f988160b3080a654a39ed46bd75702a11c52683d7e8", 0x78}], 0x6, 0x2, 0x1, {0x3, r10}}, 0x4) openat(r2, &(0x7f0000000300)='./file0\x00', 0x8040, 0x10f) preadv(r6, &(0x7f0000000340), 0x0, 0x2, 0x8001) 00:01:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfeffffff00000000) 00:01:48 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:48 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f", 0x4f}], 0x1}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:01:48 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:48 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1660.374835] loop5: detected capacity change from 0 to 16776704 [ 1660.391707] loop1: detected capacity change from 0 to 16776704 [ 1660.398439] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1660.398439] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1660.398439] [ 1660.404675] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10837 comm=syz-executor.0 [ 1660.406162] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1660.406162] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1660.406162] [ 1660.419871] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10838 comm=syz-executor.3 [ 1660.436960] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1660.440027] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1660.450120] FAULT_INJECTION: forcing a failure. [ 1660.450120] name failslab, interval 1, probability 0, space 0, times 0 [ 1660.452794] CPU: 1 PID: 10840 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1660.454272] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1660.456023] Call Trace: [ 1660.456593] dump_stack+0x107/0x167 [ 1660.457383] should_fail.cold+0x5/0xa [ 1660.458200] ? __es_insert_extent+0xed1/0x1370 [ 1660.459172] should_failslab+0x5/0x20 [ 1660.459982] kmem_cache_alloc+0x5b/0x310 [ 1660.460842] __es_insert_extent+0xed1/0x1370 [ 1660.461801] ext4_es_insert_extent+0x45d/0xf10 [ 1660.462776] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 1660.463693] ? lock_downgrade+0x6d0/0x6d0 [ 1660.464588] ? down_read+0x10f/0x430 [ 1660.465388] ? down_write+0x160/0x160 [ 1660.466195] ? ext4_es_lookup_extent+0xc4/0xa80 [ 1660.467193] ext4_map_blocks+0x501/0x1910 [ 1660.468084] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1660.469042] ? lock_acquire+0x197/0x470 [ 1660.469882] ? create_empty_buffers+0xbc/0x640 [ 1660.470848] ? lock_release+0x680/0x680 [ 1660.471693] ? find_held_lock+0x2c/0x110 [ 1660.472563] _ext4_get_block+0x21e/0x570 [ 1660.473441] ? ext4_map_blocks+0x1910/0x1910 [ 1660.474400] ? create_empty_buffers+0x4a3/0x640 [ 1660.475410] ext4_move_extents+0x1bce/0x3050 [ 1660.476403] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1660.476507] loop0: detected capacity change from 0 to 16776704 [ 1660.477515] ? lock_release+0x680/0x680 [ 1660.477567] __ext4_ioctl+0x3048/0x4220 [ 1660.479926] ? ext4_reset_inode_seed+0x450/0x450 [ 1660.480938] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1660.482065] ? find_held_lock+0x2c/0x110 [ 1660.482950] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1660.484163] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1660.485276] ? do_vfs_ioctl+0x283/0x10d0 [ 1660.486146] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1660.487179] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1660.487179] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1660.487179] [ 1660.487262] ? generic_block_fiemap+0x60/0x60 [ 1660.487282] ? lock_downgrade+0x6d0/0x6d0 [ 1660.487300] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1660.487323] ? wait_for_completion_io+0x270/0x270 [ 1660.487355] ? selinux_file_ioctl+0xb6/0x270 [ 1660.487378] ? __ext4_ioctl+0x4220/0x4220 [ 1660.487401] __x64_sys_ioctl+0x19a/0x210 [ 1660.487425] do_syscall_64+0x33/0x40 [ 1660.487449] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1660.497463] RIP: 0033:0x7fa3bc6a6b19 [ 1660.498252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1660.502142] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1660.503755] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1660.505269] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1660.506790] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1660.508300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1660.509827] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1660.526095] loop3: detected capacity change from 0 to 16776704 00:01:49 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:49 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffff7f00000000) [ 1660.625081] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10855 comm=syz-executor.5 [ 1660.625841] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1660.625841] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1660.625841] [ 1660.638109] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1660.670437] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 00:01:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f", 0x4f}], 0x1}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:01:49 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x4]}, 0x8) r1 = openat(r0, &(0x7f0000000340)='./file1\x00', 0x40283, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000017c0)=0x81, 0x8) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) fallocate(r3, 0x0, 0x0, 0x8000) r6 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000001c0)={0x0, r2, 0x2, 0x0, 0x8}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000140)='./file1\x00', 0x7, 0x1, &(0x7f0000000180)=[{&(0x7f0000000200)="5e6b01befa044b880a6b7985f367a7186c3dacc4ce19c1a30beda2c662083f322085cfd09bea5ab8d92a375f3903c99c5434294aec2353d454fdc3bec11e372847781170c2afeb26f53030cf06bd", 0x4e, 0x5c43}], 0x80, &(0x7f00000002c0)={[{@utf8no}, {@shortname_lower}, {@fat=@codepage={'codepage', 0x3d, '936'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) syz_io_uring_setup(0x8003a75, &(0x7f0000000080)={0x0, 0xa91f, 0x10, 0x0, 0x3be}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, 0x0, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r9, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r10}}, 0x7ff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001780)=@IORING_OP_WRITEV={0x2, 0x0, 0x2004, @fd_index=0x6, 0x17, &(0x7f0000001700)=[{&(0x7f0000000380)="07cbe0de7e9fecf7b797ba240b9aa38b95dd206d8b29b42e93b6cca9193900e4376a0709ef991756201a8343fd15af69b146daa1bcb97486c7fc", 0x3a}, {&(0x7f0000000400)="4963138cd31a757ba89451696d58b788388bf96c2ab6ba21ba46b2f9ddcc57102a12f64047ff6f93e2fe65b57bb35a93b4de4c98a116c0c456c4c3913e4881a1f64310fc1a3bf98e6a1dd2507e2a7b8ef1c31e253fe82a3b6350e8c899421d0b55c558f8bd20fa4af96e8545a4073dc42e454655b0cc1ae7fffc613811f85e0e0c81b22137c1bae0e43650fcb59b70baeedc2fa1671c383d1384857e327d3df3d2f1a814f1015283d4600a03aebd08084e7483564903c27dbf103c27eb", 0xbd}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f00000004c0)}, {&(0x7f0000001580)="ef08b425ad7545897b3afe01490e46768a11d1cdf7f992be3f3e8484c47eb54599c715bc641b501933d42a4b1230a9a29cf81302f227a5c82e4d1dad0ce89a41a14f8cd46dcbb98bd1b796b47453dfe436f21c116f7060c59b4cd30b2ca423810a5b469c2ee6f392100d067d478cac1fe80c8a989d3e50e38318f36ab86ff66d45882a36122cd237a9063a3743988252cf203761ee9f29ce9c6efbf40079c90abf49f623564d2c1c959e7b31eeb80ded489f5f5ffe957c7d55bb6a682e24a084455e1faa8d4e344beb689cb2ffb613b7e996218230216e42837ee4c4fe037a63b3a2f49a7a49e7c2a86630", 0xeb}, {&(0x7f0000001680)="1b2e7cdd7ecee9cff7a01f7961185eb58a4b765a6341819e05c7f6554750345166db5fdc56747efbfafd83e51d14ff114a4097b8276feb92ce0596a1973c03e97b7d2c37eb584b3f486de244d2072afb46ba9751cea95498b8bc0c6f7ed6d14056d09f988160b3080a654a39ed46bd75702a11c52683d7e8", 0x78}], 0x6, 0x2, 0x1, {0x3, r10}}, 0x4) openat(r2, &(0x7f0000000300)='./file0\x00', 0x8040, 0x10f) preadv(r6, &(0x7f0000000340), 0x0, 0x2, 0x8001) 00:01:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffffff00000000) 00:01:49 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:49 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:01:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 35) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 00:01:49 executing program 3: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x5e033, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000000c0)=0x1, &(0x7f0000000100)=0x4) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1000007, 0x830, r0, 0xb02e0000) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000001000/0x4000)=nil], 0x0, 0x0, 0x0) [ 1660.783850] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10871 comm=syz-executor.0 [ 1660.799058] loop5: detected capacity change from 0 to 16776704 [ 1660.815937] loop0: detected capacity change from 0 to 16776704 [ 1660.835399] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1660.835399] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1660.835399] 00:01:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffffffffff000) [ 1660.847021] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1660.854630] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1660.854630] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1660.854630] [ 1660.887576] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1660.950707] FAULT_INJECTION: forcing a failure. [ 1660.950707] name failslab, interval 1, probability 0, space 0, times 0 [ 1660.952190] CPU: 0 PID: 10885 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1660.952970] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1660.953929] Call Trace: [ 1660.954234] dump_stack+0x107/0x167 [ 1660.954647] should_fail.cold+0x5/0xa [ 1660.955079] ? create_object.isra.0+0x3a/0xa30 [ 1660.955591] should_failslab+0x5/0x20 [ 1660.956024] kmem_cache_alloc+0x5b/0x310 [ 1660.956486] create_object.isra.0+0x3a/0xa30 [ 1660.956982] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1660.957554] __kmalloc+0x16e/0x390 [ 1660.957957] ext4_find_extent+0xa77/0xd70 [ 1660.958432] ext4_swap_extents+0x364/0x14c0 [ 1660.958925] ? ext4_get_es_cache+0x620/0x620 [ 1660.959439] ? down_write_nested+0xe4/0x160 [ 1660.959925] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1660.960513] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1660.961158] ext4_move_extents+0x19d5/0x3050 [ 1660.961681] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1660.962269] ? lock_release+0x680/0x680 [ 1660.962741] __ext4_ioctl+0x3048/0x4220 [ 1660.963197] ? ext4_reset_inode_seed+0x450/0x450 [ 1660.963730] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1660.964320] ? find_held_lock+0x2c/0x110 [ 1660.964800] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1660.965457] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1660.966056] ? do_vfs_ioctl+0x283/0x10d0 [ 1660.966516] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1660.967114] ? generic_block_fiemap+0x60/0x60 [ 1660.967616] ? lock_downgrade+0x6d0/0x6d0 [ 1660.968096] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1660.968640] ? wait_for_completion_io+0x270/0x270 [ 1660.969209] ? selinux_file_ioctl+0xb6/0x270 [ 1660.969708] ? __ext4_ioctl+0x4220/0x4220 [ 1660.970185] __x64_sys_ioctl+0x19a/0x210 [ 1660.970649] do_syscall_64+0x33/0x40 [ 1660.971081] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1660.971672] RIP: 0033:0x7fa3bc6a6b19 [ 1660.972104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1660.974230] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1660.975108] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1660.975930] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1660.976752] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1660.977588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1660.978409] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 00:02:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 36) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 00:02:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x15) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xb9, 0x1, 0x7, 0x7, 0x0, 0x0, 0x100, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x8000, 0x6}, 0x537c1, 0x7f, 0x400, 0x2, 0x0, 0x4, 0xc6, 0x0, 0x4, 0x0, 0x80000001}, 0xffffffffffffffff, 0x10, r1, 0xb) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYRESHEX=r4], 0x14}, 0x1, 0x0, 0x0, 0x440c4}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x28100, 0x0) 00:02:02 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:02 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd130, 0x0, @perf_config_ext, 0x1028, 0x7fffffff, 0x10003fe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() ioprio_get$pid(0x0, r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') preadv(r1, &(0x7f00000002c0)=[{&(0x7f00000011c0)=""/121, 0x79}], 0x1, 0x1f, 0x7fffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5, 0xc3, 0x8, 0xfa, 0x0, 0x6, 0x8841, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000040), 0xd}, 0x0, 0x3e68, 0xfffffff8, 0x0, 0x3, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x100}, r0, 0x2, r1, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) recvmmsg$unix(r1, &(0x7f00000007c0)=[{{&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000640)=[{&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000000380)=""/136, 0x88}, {&(0x7f0000000440)=""/231, 0xe7}, {&(0x7f0000000540)=""/220, 0xffffffffffffff46}], 0x4, &(0x7f0000000680)}}], 0x1, 0x2, &(0x7f0000000800)={0x77359400}) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0xff, 0x2, 0xd4, 0x12, 0x0, 0x0, 0x10180, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5f4a, 0x4, @perf_bp={&(0x7f0000000200), 0xa}, 0x40010, 0x1ff, 0x5062, 0x1, 0x10001, 0xffff, 0x101, 0x0, 0x6, 0x0, 0x7}, r0, 0x4, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) r3 = fsmount(r1, 0x0, 0xc8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x9, 0xed, 0x2, 0x6, 0x0, 0x3ad4, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x3f}, 0x10, 0x7, 0x80, 0x6, 0x8, 0x2, 0xdf, 0x0, 0xffff, 0x0, 0xffffffffffffced8}, r0, 0x3, r3, 0x9) pipe(&(0x7f0000000000)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 00:02:02 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f", 0x4f}], 0x1}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:02:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) 00:02:02 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1673.784673] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10902 comm=syz-executor.5 [ 1673.802187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10906 comm=syz-executor.0 [ 1673.853743] loop5: detected capacity change from 0 to 16776704 00:02:02 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x201, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x88000, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x20d0019, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB='Awgdno=', @ANYRESHEX=r2, @ANYBLOB=',cache=none,uname=m-#{-,dont_hash,fowner=', @ANYRESDEC=r3, @ANYBLOB=',smackfshat=!/,appraise_type=imasig,fowner>', @ANYRESDEC=0xee01, @ANYBLOB=',uid=', @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,\x00']) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000080)) timerfd_gettime(r0, &(0x7f00000000c0)) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r4, &(0x7f0000000080)='+', 0x1, 0x0) timerfd_settime(r4, 0x1, &(0x7f00000003c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000400)) readv(r0, &(0x7f0000003400)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1) [ 1673.874940] loop0: detected capacity change from 0 to 16776704 [ 1673.889528] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1673.889528] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1673.889528] [ 1673.905052] loop1: detected capacity change from 0 to 16776704 [ 1673.915588] FAULT_INJECTION: forcing a failure. [ 1673.915588] name failslab, interval 1, probability 0, space 0, times 0 [ 1673.918211] CPU: 1 PID: 10911 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1673.919694] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1673.921468] Call Trace: [ 1673.922037] dump_stack+0x107/0x167 [ 1673.922814] should_fail.cold+0x5/0xa [ 1673.923628] ? ext4_find_extent+0xa77/0xd70 [ 1673.924541] should_failslab+0x5/0x20 [ 1673.925349] __kmalloc+0x72/0x390 [ 1673.926107] ext4_find_extent+0xa77/0xd70 [ 1673.926998] ? __lock_acquire+0x1657/0x5b00 [ 1673.927919] ext4_ext_map_blocks+0x1c8/0x5880 [ 1673.928879] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1673.929997] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1673.931102] ? lock_acquire+0x197/0x470 [ 1673.931957] ? ext4_ext_release+0x10/0x10 [ 1673.932854] ? lock_release+0x680/0x680 [ 1673.933711] ? ext4_es_lookup_extent+0x485/0xa80 [ 1673.934709] ? lock_downgrade+0x6d0/0x6d0 [ 1673.935588] ? __lock_acquire+0xbb1/0x5b00 [ 1673.936494] ? down_read+0x10f/0x430 [ 1673.937286] ? down_write+0x160/0x160 [ 1673.938088] ? ext4_es_lookup_extent+0xc4/0xa80 [ 1673.939086] ext4_map_blocks+0x8e1/0x1910 [ 1673.939979] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1673.940923] ? lock_acquire+0x197/0x470 [ 1673.941777] ? create_empty_buffers+0xbc/0x640 [ 1673.942746] ? lock_release+0x680/0x680 [ 1673.943588] ? find_held_lock+0x2c/0x110 [ 1673.944449] _ext4_get_block+0x21e/0x570 [ 1673.945320] ? ext4_map_blocks+0x1910/0x1910 [ 1673.946253] ? create_empty_buffers+0x4a3/0x640 [ 1673.947253] ext4_move_extents+0x1bce/0x3050 [ 1673.948240] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1673.949350] ? lock_release+0x680/0x680 [ 1673.950217] __ext4_ioctl+0x3048/0x4220 [ 1673.951070] ? ext4_reset_inode_seed+0x450/0x450 [ 1673.952075] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1673.953178] ? find_held_lock+0x2c/0x110 [ 1673.954071] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1673.955290] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1673.956376] ? do_vfs_ioctl+0x283/0x10d0 [ 1673.957246] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1673.958349] ? generic_block_fiemap+0x60/0x60 [ 1673.959288] ? lock_downgrade+0x6d0/0x6d0 [ 1673.960159] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1673.961179] ? wait_for_completion_io+0x270/0x270 [ 1673.962217] ? selinux_file_ioctl+0xb6/0x270 [ 1673.963150] ? __ext4_ioctl+0x4220/0x4220 [ 1673.964036] __x64_sys_ioctl+0x19a/0x210 [ 1673.964892] do_syscall_64+0x33/0x40 [ 1673.965683] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1673.966772] RIP: 0033:0x7fa3bc6a6b19 [ 1673.967554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1673.971407] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1673.972989] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1673.974468] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1673.975959] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1673.977470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1673.978979] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 [ 1673.984494] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1673.984494] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1673.984494] [ 1674.007070] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 00:02:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, 0x3f7, 0x20, 0x70bd2d, 0x25dfdbfe, {0x7, 0x7, './file0', './file1'}, ["", "", ""]}, 0x28}}, 0x40) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x100000000, 0x4, &(0x7f0000000340)=[{&(0x7f0000000400)="6d762cb29bda00972a5a6a8121f476bc377e6227ea696b437907f10e93ba66bcb930d3cc8c52f5196c333ff94a3cb8d9e95534f9cf3d338aa1edfff80b3df43ab27e48b3d756eff71729c75aca2141edf82a3d8720bc14fd7368bfc577529498b0e471ac93dcf0623b260ec33203e17d48bbac7a9bac572b64d94a4d61286bf75a1daa5c1ab1", 0x86, 0x4}, {&(0x7f0000000100)="39d7ac9595e42e1a9dac84f93e2a83a52f8b22b26c0e6f33dc540871f599a71f96374e661abdb1e31418f48624eef4ff7c", 0x31, 0x10001}, {&(0x7f0000000140)="a1", 0x1, 0x101}, {&(0x7f00000004c0)="837ade96b68cc605f47c1bb3957328116a86fe56e136f564260810514c71758b686ddce43e071e42483e69287ed100ea44bc9df343f137f329fab320e7d9f8ca266f061546c0c5e950722144062958902fc9a58deb0192cb6f2792d008ebcabeba499d678d82f27991ab4c0f33d9f87163dbe3d1a62e8d1277db9b3205b733e7ff3054c724b893f67d4a94d2e5456555c77583bd4bd015b582e346a6f792598f6be7f57efae62f6e81672ccb6456f57d7827ebffa9530aa3f1eff9b2e19748598ae655a2a06b9a2cd9068ce688af", 0xce, 0xa7}], 0x80008, &(0x7f00000005c0)={[{@map_acorn}, {@hide}, {@gid={'gid', 0x3d, 0xee00}}, {@block={'block', 0x3d, 0x800}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '^-[!(!&'}}, {@appraise_type}, {@obj_user={'obj_user', 0x3d, '-'}}]}) [ 1674.047176] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 00:02:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) 00:02:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f", 0x4f}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:02:02 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1674.113908] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1674.113908] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1674.113908] 00:02:02 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1674.169489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10936 comm=syz-executor.5 [ 1674.227538] loop5: detected capacity change from 0 to 16776704 [ 1674.255040] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1674.255040] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1674.255040] [ 1674.272747] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1674.310991] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10941 comm=syz-executor.0 [ 1674.328595] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1688.669125] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10959 comm=syz-executor.5 [ 1688.674127] loop5: detected capacity change from 0 to 16776704 [ 1688.677081] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10951 comm=syz-executor.0 [ 1688.679397] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1688.679397] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1688.679397] [ 1688.683773] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10953 comm=syz-executor.3 00:02:17 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x201, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x88000, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x20d0019, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB='Awgdno=', @ANYRESHEX=r2, @ANYBLOB=',cache=none,uname=m-#{-,dont_hash,fowner=', @ANYRESDEC=r3, @ANYBLOB=',smackfshat=!/,appraise_type=imasig,fowner>', @ANYRESDEC=0xee01, @ANYBLOB=',uid=', @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,\x00']) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000080)) timerfd_gettime(r0, &(0x7f00000000c0)) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r4, &(0x7f0000000080)='+', 0x1, 0x0) timerfd_settime(r4, 0x1, &(0x7f00000003c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000400)) readv(r0, &(0x7f0000003400)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1) 00:02:17 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f", 0x4f}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:02:17 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:17 executing program 3: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000080)='+', 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(r2, &(0x7f0000000240)={0x11, 0x8, r4, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) recvfrom$packet(r1, &(0x7f0000000400)=""/247, 0xf7, 0x12000, &(0x7f0000000040)={0x11, 0x1c, r4, 0x1, 0x1, 0x6, @remote}, 0x14) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000000c0)=ANY=[@ANYBLOB="fbad41defbf684fa01782321202e6f666c65b66700d6877122a2f300b2d7371f04f5afaa4a070000000000000012677dbd4f0d7495f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x100000001}}, 0x0, 0xffffffffffffffff, r6, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 00:02:17 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 37) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) [ 1688.709875] loop1: detected capacity change from 0 to 16776704 [ 1688.718054] loop3: detected capacity change from 0 to 16776704 [ 1688.721176] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1688.727494] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1688.727494] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1688.727494] [ 1688.734627] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1688.734627] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1688.734627] [ 1688.738764] loop0: detected capacity change from 0 to 16776704 00:02:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x14000, 0x0) pwrite64(r1, &(0x7f0000000140)='Y\b', 0x2, 0xfffffffffffffffc) openat(r3, &(0x7f0000000080)='./file0\x00', 0x503080, 0x45) [ 1688.760837] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1688.760908] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1688.791033] FAULT_INJECTION: forcing a failure. [ 1688.791033] name failslab, interval 1, probability 0, space 0, times 0 [ 1688.792745] CPU: 1 PID: 10976 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1688.793616] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1688.794645] Call Trace: [ 1688.794977] dump_stack+0x107/0x167 [ 1688.795430] should_fail.cold+0x5/0xa [ 1688.795902] ? create_object.isra.0+0x3a/0xa30 [ 1688.796464] should_failslab+0x5/0x20 [ 1688.796944] kmem_cache_alloc+0x5b/0x310 [ 1688.797478] create_object.isra.0+0x3a/0xa30 [ 1688.798026] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1688.798659] __kmalloc+0x16e/0x390 [ 1688.799116] ext4_find_extent+0xa77/0xd70 [ 1688.799633] ? __lock_acquire+0x1657/0x5b00 [ 1688.800169] ext4_ext_map_blocks+0x1c8/0x5880 [ 1688.800736] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1688.801391] ? perf_trace_lock+0xac/0x490 [ 1688.801912] ? lock_acquire+0x197/0x470 [ 1688.802410] ? ext4_ext_release+0x10/0x10 [ 1688.802928] ? lock_release+0x680/0x680 [ 1688.803430] ? ext4_es_lookup_extent+0x485/0xa80 [ 1688.804010] ? lock_downgrade+0x6d0/0x6d0 [ 1688.804522] ? __lock_acquire+0xbb1/0x5b00 [ 1688.805049] ? down_read+0x10f/0x430 [ 1688.805519] ? down_write+0x160/0x160 [ 1688.805986] ? ext4_es_lookup_extent+0xc4/0xa80 [ 1688.806565] ext4_map_blocks+0x8e1/0x1910 [ 1688.807080] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1688.807628] ? __lockdep_reset_lock+0x180/0x180 [ 1688.808202] ? create_empty_buffers+0xbc/0x640 [ 1688.808763] ? lock_release+0x680/0x680 [ 1688.809250] ? find_held_lock+0x2c/0x110 [ 1688.809765] _ext4_get_block+0x21e/0x570 [ 1688.810273] ? ext4_map_blocks+0x1910/0x1910 [ 1688.810816] ? create_empty_buffers+0x4a3/0x640 [ 1688.811395] ext4_move_extents+0x1bce/0x3050 [ 1688.811972] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1688.812616] ? lock_release+0x680/0x680 [ 1688.813121] __ext4_ioctl+0x3048/0x4220 [ 1688.813628] ? ext4_reset_inode_seed+0x450/0x450 [ 1688.814211] ? perf_trace_lock+0xac/0x490 [ 1688.814736] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1688.815440] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1688.816085] ? do_vfs_ioctl+0x283/0x10d0 [ 1688.816584] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1688.817228] ? generic_block_fiemap+0x60/0x60 [ 1688.817792] ? lock_downgrade+0x6d0/0x6d0 [ 1688.818299] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1688.818890] ? wait_for_completion_io+0x270/0x270 [ 1688.819485] ? selinux_file_ioctl+0xb6/0x270 [ 1688.820026] ? __ext4_ioctl+0x4220/0x4220 [ 1688.820531] __x64_sys_ioctl+0x19a/0x210 [ 1688.821027] do_syscall_64+0x33/0x40 [ 1688.821487] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1688.822112] RIP: 0033:0x7fa3bc6a6b19 [ 1688.822567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1688.824806] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1688.825740] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1688.826615] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1688.827480] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1688.828351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1688.829216] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 00:02:17 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x93b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) r2 = dup(r0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000001000010000000000000000960000090005000000000000000500008048000000"], 0x24}}, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x301000, 0x0) r4 = openat(r3, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) read(0xffffffffffffffff, &(0x7f0000000640)=""/135, 0x87) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0xffff57e9, 0x4006) syz_io_uring_setup(0x46bd, &(0x7f00000007c0)={0x0, 0x3fb0, 0x2, 0x3, 0x2df}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000600)) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000880)={0x1f, 0x0, @fixed}, &(0x7f0000000280)=0xe, 0x0) write$vga_arbiter(r3, &(0x7f0000000000), 0xf) pwritev2(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000002c0)="e10de7241ead01197b740010c0af1f6ccc5a5266fb6fbf96e3c4dc4d3aba4ac1612123f1978747ef044bcdc557a33d170c9d26b8ef7bc00e0ca725f43d1effea1973bbea76c068670cb8a3e0712eb0ad27b4ecca6ffe2788e474323398fbed8c3e3720315302393d70bd288ca5d3391def8d2e401c97e234adad19af360eae15d53c7c8c8033f45d47fceca6dcec03c8a544736aacd5a5aa7a70678b759e9ba29c805e2c670290236675", 0xffffffffffffff28}, {&(0x7f0000000980)="bddbce4a6d057e5bc8290a2ccbef994e05d02895818f6525a811cc5d05de45b95c8090e63fe06128fee8025c11ca9c1ed8c4080e7ed622882bcadcbd2d56e10a949fe86e57d28a8ec8e540bd598b1bc662a7b5c1473bf2d1a065231b5229b78d87f94d2e977120fc4752a35ff7b57b51042b9380a5b0a2a82e1db0d005f87041427d01c14fb5799c66c59e373555ce88bb1c3abc81b48e86ff19", 0x9a}, {&(0x7f00000008c0)="f2564466d08f69d24b120067cd9426c2c370629c04000000ac1112747616f5b7262d230885ee808934da3d6e6dadb32a736d80c6da2866d8373dcf3dafddb3cd931dfae5d2155de8fe16c271dfa20091cade8b1a07ecef7ced91155e15347aeea5ecdf1e14f3428011376f731b69c531dd27bb8652955f0110e27049fe06cc0fcb35683697f97537adf1c3298c3c5c4480fe6db7444a", 0x99}], 0x3, 0x9, 0x3, 0x4) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x100000a, 0x13, 0xffffffffffffffff, 0xe6b8a000) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}], 0x28}}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x29, 0x4, 0x7, 0x401, 0x1, @remote, @empty, 0x1, 0x20, 0x0, 0x6}}) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r2, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f0000000700)={0xac, 0x0, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ID={0x5}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0xac}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) 00:02:17 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1688.880506] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1688.880506] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1688.880506] [ 1688.896001] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10981 comm=syz-executor.5 00:02:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8, 0x11, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) syz_io_uring_setup(0x8003a75, &(0x7f0000000080)={0x0, 0xa91f, 0x10, 0x0, 0x3be}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, 0x0, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r7}}, 0x7ff) syz_io_uring_submit(r3, 0x0, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x4, &(0x7f0000000080), 0x1, 0x1, 0x1, {0x0, r7}}, 0x40) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 00:02:17 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f", 0x4f}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:02:17 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1689.055194] loop1: detected capacity change from 0 to 16776704 [ 1689.060973] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1689.109716] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=10994 comm=syz-executor.5 [ 1689.118046] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1689.118046] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1689.118046] 00:02:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 38) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) [ 1689.134869] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1689.167179] loop5: detected capacity change from 0 to 16776704 [ 1689.183600] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1689.183600] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1689.183600] [ 1689.193712] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1689.205812] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1689.266383] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1689.268103] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1689.270035] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1689.284551] FAULT_INJECTION: forcing a failure. [ 1689.284551] name failslab, interval 1, probability 0, space 0, times 0 [ 1689.285862] CPU: 1 PID: 11004 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1689.286649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1689.287599] Call Trace: [ 1689.287909] dump_stack+0x107/0x167 [ 1689.288330] should_fail.cold+0x5/0xa [ 1689.288775] ? xas_alloc+0x336/0x440 [ 1689.289206] should_failslab+0x5/0x20 [ 1689.289655] kmem_cache_alloc+0x5b/0x310 [ 1689.290125] xas_alloc+0x336/0x440 [ 1689.290537] xas_create+0x60f/0x10d0 [ 1689.290974] xas_store+0x8c/0x1c40 [ 1689.291386] ? xas_find_conflict+0x4b5/0xa70 [ 1689.291897] __add_to_page_cache_locked+0x708/0xc80 [ 1689.292475] ? file_write_and_wait_range+0x130/0x130 [ 1689.293061] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1689.293652] ? find_get_entry+0x2c8/0x740 [ 1689.294125] ? lru_cache_add+0x45c/0x800 [ 1689.294597] add_to_page_cache_lru+0xe6/0x2e0 [ 1689.295116] ? add_to_page_cache_locked+0x40/0x40 [ 1689.295676] ? __page_cache_alloc+0x10d/0x360 [ 1689.296198] pagecache_get_page+0x38b/0xc80 [ 1689.296696] grab_cache_page_write_begin+0x64/0xa0 [ 1689.297258] ext4_move_extents+0x1224/0x3050 [ 1689.297803] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1689.298408] ? lock_release+0x680/0x680 [ 1689.298881] __ext4_ioctl+0x3048/0x4220 [ 1689.299349] ? ext4_reset_inode_seed+0x450/0x450 [ 1689.299892] ? perf_trace_lock+0xac/0x490 [ 1689.300382] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1689.301044] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1689.301645] ? do_vfs_ioctl+0x283/0x10d0 [ 1689.302113] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1689.302719] ? generic_block_fiemap+0x60/0x60 [ 1689.303232] ? lock_downgrade+0x6d0/0x6d0 [ 1689.303714] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1689.304272] ? wait_for_completion_io+0x270/0x270 [ 1689.304834] ? selinux_file_ioctl+0xb6/0x270 [ 1689.305342] ? __ext4_ioctl+0x4220/0x4220 [ 1689.305828] __x64_sys_ioctl+0x19a/0x210 [ 1689.306298] do_syscall_64+0x33/0x40 [ 1689.306725] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1689.307317] RIP: 0033:0x7fa3bc6a6b19 [ 1689.307750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1689.309862] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1689.310734] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1689.311547] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1689.312362] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1689.313174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1689.314002] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 00:02:30 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f", 0x4f}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:02:30 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x6e2, 0x0) ftruncate(r0, 0x1000004) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x8}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) lseek(r1, 0x0, 0x2) r2 = syz_io_uring_setup(0x5e4e, &(0x7f0000000480), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000080)) io_uring_enter(r2, 0x58ab, 0x1, 0x0, 0x0, 0x0) syz_io_uring_setup(0x7c22, &(0x7f0000000280)={0x0, 0x5cc0, 0x20, 0x0, 0x3b9, 0x0, r2}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r3, 0x0, &(0x7f0000000240)=@IORING_OP_OPENAT={0x12, 0x1, 0x0, r1, 0x0, &(0x7f0000000200)='./file0\x00', 0x14, 0x721001, 0x23456}, 0x1d) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r1, 0x0, 0x200f5ef, 0x0) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r5, &(0x7f0000000080)='+', 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r1) 00:02:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1811c1, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) fallocate(r2, 0x0, 0x0, 0x8000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x8}) (fail_nth: 39) preadv(r5, &(0x7f0000000340), 0x0, 0x2, 0x8001) 00:02:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) syz_open_dev$evdev(&(0x7f0000000080), 0x3, 0x800) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100), &(0x7f0000000140)={'L-', 0x123}, 0x16, 0x2) socketpair(0xb, 0x800, 0xffffffc0, &(0x7f00000000c0)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002640)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4, 0x2}]}, 0x18}}, 0x0) close(r3) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f14100b2d73776d761854ab48a12677dbd4f0d7485f2fdae3ecc944d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 00:02:30 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:30 executing program 3: execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000140)=']\x00', &(0x7f0000000500)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00', 0x0, &(0x7f0000000540)='v,+[-&H\x00*\x11T\xf3|j\xadL\x197\x17\xe3\xd3S\xdf=\xcck\xabmv\xe5\xdbe\x8f\xe7\x13(5\x87%\x9c\xdf\x84`8\r\xcb\xf0!B\xd0?\xe1\x18<\xb0\xeblE\x1d\xda\n}\x82f^\xc9\x18\xf9\xa3\xd0_\x8e\xec2hN\xcc\xca\x1cH\xf8<\x04\xd0\nF\x88|\x96x]\xca\xdez\x05'], &(0x7f0000000440), 0x1000) ftruncate(0xffffffffffffffff, 0x1000003) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000b80)=""/145, 0x91}, {&(0x7f0000000b00)=""/108, 0x6c}], 0x3, 0x1, 0x8) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, 0x25, 0xc21}, 0x14}}, 0x0) openat(r2, &(0x7f0000000080)='./file0\x00', 0x200, 0x4a) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0xb2, 0xd34, 0x1, 0x1f, 0x4}) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pidfd_send_signal(r3, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000008c0)=@v3={0x3000000, [{}, {0x1ff, 0x7f}]}, 0x18, 0x0) open(&(0x7f0000000240)='\x00', 0x200, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x5c0, 0x0) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f0000000280)) ioctl$AUTOFS_IOC_ASKUMOUNT(r4, 0x80049370, &(0x7f00000004c0)) sendmsg$nl_generic(r2, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x102c}, 0x1, 0x0, 0x0, 0x4004090}, 0x20000080) [ 1702.464207] loop1: detected capacity change from 0 to 16776704 [ 1702.473495] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=11023 comm=syz-executor.0 [ 1702.481991] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=11028 comm=syz-executor.5 [ 1702.491896] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1702.491896] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1702.491896] [ 1702.492068] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=53 sclass=netlink_xfrm_socket pid=11020 comm=syz-executor.3 [ 1702.499731] loop5: detected capacity change from 0 to 16776704 [ 1702.533711] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1702.533711] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1702.533711] [ 1702.544852] loop0: detected capacity change from 0 to 16776704 [ 1702.551947] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1702.580006] FAULT_INJECTION: forcing a failure. [ 1702.580006] name failslab, interval 1, probability 0, space 0, times 0 [ 1702.582706] CPU: 1 PID: 11035 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 1702.584183] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1702.585947] Call Trace: [ 1702.586516] dump_stack+0x107/0x167 [ 1702.587292] should_fail.cold+0x5/0xa [ 1702.588099] ? create_object.isra.0+0x3a/0xa30 [ 1702.589065] should_failslab+0x5/0x20 [ 1702.589889] kmem_cache_alloc+0x5b/0x310 [ 1702.590759] create_object.isra.0+0x3a/0xa30 [ 1702.591693] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1702.592775] kmem_cache_alloc+0x159/0x310 [ 1702.593670] __es_insert_extent+0xed1/0x1370 [ 1702.594635] ext4_es_insert_extent+0x45d/0xf10 [ 1702.595631] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 1702.596545] ? lock_downgrade+0x6d0/0x6d0 [ 1702.597438] ? down_read+0x10f/0x430 [ 1702.598235] ? down_write+0x160/0x160 [ 1702.599041] ? ext4_es_lookup_extent+0xc4/0xa80 [ 1702.600045] ext4_map_blocks+0x501/0x1910 [ 1702.600936] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1702.601892] ? lock_acquire+0x197/0x470 [ 1702.602734] ? create_empty_buffers+0xbc/0x640 [ 1702.603703] ? lock_release+0x680/0x680 [ 1702.604547] ? find_held_lock+0x2c/0x110 [ 1702.605411] _ext4_get_block+0x21e/0x570 [ 1702.606289] ? ext4_map_blocks+0x1910/0x1910 [ 1702.607226] ? create_empty_buffers+0x4a3/0x640 [ 1702.608221] ext4_move_extents+0x1bce/0x3050 [ 1702.609212] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1702.610333] ? lock_release+0x680/0x680 [ 1702.611212] __ext4_ioctl+0x3048/0x4220 [ 1702.612066] ? ext4_reset_inode_seed+0x450/0x450 [ 1702.613075] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1702.614199] ? find_held_lock+0x2c/0x110 [ 1702.615087] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1702.616307] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1702.617414] ? do_vfs_ioctl+0x283/0x10d0 [ 1702.618286] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1702.619423] ? generic_block_fiemap+0x60/0x60 [ 1702.620685] ? lock_downgrade+0x6d0/0x6d0 [ 1702.621565] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1702.622612] ? wait_for_completion_io+0x270/0x270 [ 1702.623644] ? selinux_file_ioctl+0xb6/0x270 [ 1702.624582] ? __ext4_ioctl+0x4220/0x4220 [ 1702.625469] __x64_sys_ioctl+0x19a/0x210 [ 1702.626345] do_syscall_64+0x33/0x40 [ 1702.627146] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1702.628240] RIP: 0033:0x7fa3bc6a6b19 [ 1702.629033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1702.632926] RSP: 002b:00007fa3b9bfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1702.634548] RAX: ffffffffffffffda RBX: 00007fa3bc7ba020 RCX: 00007fa3bc6a6b19 [ 1702.636067] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1702.637580] RBP: 00007fa3b9bfb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1702.639107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1702.640620] R13: 00007ffedc4703bf R14: 00007fa3b9bfb300 R15: 0000000000022000 00:02:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f", 0x4f}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1702.691768] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1702.695558] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1702.695558] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1702.695558] 00:02:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f", 0x4f}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) 00:02:31 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x1f9) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e6f666c65b66700d6877122f1412fc233d5865974d24a4d00e5349d"], 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@debug={'debug', 0x3d, 0x1}}, {@access_user}], [{@obj_role}]}}) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)='\b', 0x1}], 0x1, 0x6) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r3, &(0x7f0000000080)='+', 0x1, 0x0) getdents64(r3, &(0x7f0000000400)=""/249, 0xf9) 00:02:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x6e2, 0x0) ftruncate(r0, 0x1000004) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x8}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) lseek(r1, 0x0, 0x2) r2 = syz_io_uring_setup(0x5e4e, &(0x7f0000000480), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000080)) io_uring_enter(r2, 0x58ab, 0x1, 0x0, 0x0, 0x0) syz_io_uring_setup(0x7c22, &(0x7f0000000280)={0x0, 0x5cc0, 0x20, 0x0, 0x3b9, 0x0, r2}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r3, 0x0, &(0x7f0000000240)=@IORING_OP_OPENAT={0x12, 0x1, 0x0, r1, 0x0, &(0x7f0000000200)='./file0\x00', 0x14, 0x721001, 0x23456}, 0x1d) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r1, 0x0, 0x200f5ef, 0x0) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r5, &(0x7f0000000080)='+', 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r1) [ 1702.793882] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue 00:02:31 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:31 executing program 5: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1702.894781] loop3: detected capacity change from 0 to 16776704 [ 1702.908628] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1702.908628] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1702.908628] 00:02:31 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)=[0xff, 0xf7e]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500000000000000000000000000140000001100010000000000000000000000000a708165dbb33f408d18f4e0406439e3b36db5f8fa02fcc272d8ffa4b576512646360da81aeebd25f1bb4ab1d072062f7cb23c998bff805155637622ea7624a883c22da86dcaccc37652503879ce77dd6ad66d5b073595c0185ca7ba0b0477"], 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/168) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(r3, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:31 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) [ 1702.987665] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1703.038689] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=11071 comm=syz-executor.0 [ 1703.038805] loop1: detected capacity change from 0 to 16776704 [ 1703.050512] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1703.050512] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1703.050512] [ 1703.079524] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1703.081259] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=11074 comm=syz-executor.5 00:02:31 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x10000) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x4f00000000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0xac1414d3, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c006c0b9a4ba465ca97bbce07763fc3f7179f9b78300bb671ffe0211f04ad148cef8178ddec467d000064dbc2abc3fcefe85730912d7ff116b8e12331de2984b84daf1a8f740d7dd5fe381009e5bf1251b38d9bfe104bf53b9085476c170fc6169581f263b6d5f2466a585d0b384d8ec657fdb682b399e05f023c980c52ab99c4d6f357ba3485a610cb7708e817a304c875058df9bed008cfbb8e3dd5d45bf92521297721dd214fe48a2917fdc17884dce60b2f8257c963bdc5f910395f1df3830b5587a6ce8549"]) 00:02:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_complete(r1) fcntl$dupfd(r0, 0x406, r3) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000040)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)='0', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="cad5340f07f2b18fd4ef3926de34b5b5aad5c78e64427fd67cac7e4aceb7cd8f892df177ef6995be7a57d5a2afc738e625e0596b7d0de4b61a924a9d37177a2e7e4d701069bd9790e7d5dc47478d601a4e24396850599da9467bd2fa346290b5bbfe0ca1860f717afcda400409992ef5b66872f82d59", 0x76}, {&(0x7f00000003c0)="167175806851dfe015e1433d28354a9027e2de3be5a4806c9beb84781667d782293b390a84c97c81b73e66134382c04486732d001d6859d708c600a920d95fab98aebb7064c53a3e2816f19c2ca64f", 0x4f}], 0x2}}], 0x3, 0x0) sendfile(r4, r2, &(0x7f0000000000)=0x3ffc, 0x5) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) read(0xffffffffffffffff, &(0x7f00000004c0)=""/14, 0xe) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000e, 0x380110, r0, 0x8000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) dup2(0xffffffffffffffff, r5) [ 1703.121093] loop0: detected capacity change from 0 to 16776704 [ 1703.148483] loop5: detected capacity change from 0 to 16776704 [ 1703.183740] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 1703.183740] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1703.183740] [ 1703.208666] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 1703.208666] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1703.208666] [ 1703.227892] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1703.232215] loop1: detected capacity change from 0 to 16776704 [ 1703.262473] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 1703.262473] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1703.262473] [ 1703.263180] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 1703.322565] EXT4-fs (loop1): mounted filesystem without journal. Opts: noacl,,errors=continue VM DIAGNOSIS: 00:07:32 Registers: info registers vcpu 0 RAX=ffffffff83e9ba40 RBX=0000000000000000 RCX=ffffffff83e836ac RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e9c208 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff8567acc8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e9ba4e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055ad6d8ee678 CR3=000000000ebdc000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=000000c00008d560000000c0002ec370 XMM04=000000c00017a270000000c00017a240 XMM05=000000c00017a2d0000000c00017a2a0 XMM06=000000c00017a330000000c00017a300 XMM07=000000c00017a360000000c000055500 XMM08=000000c00017a2a0000000c00017a270 XMM09=000000c00017a300000000c00017a2d0 XMM10=000000c000055500000000c00017a330 XMM11=000000c00017a390000000c00017a360 XMM12=000000c00017a3f0000000c00017a3c0 XMM13=000000c00017a450000000c00017a420 XMM14=000000c00017a4b0000000c00017a480 XMM15=000000c00017d1e0000000c00017a4e0 info registers vcpu 1 RAX=ffffffff83e9ba40 RBX=0000000000000001 RCX=ffffffff83e836ac RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e9c208 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff8567acc8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e9ba4e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff80ccf5010 CR3=000000000ebdc000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004150f72e00000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000