cbfed36d3080c11a75ac5489c2c03aff8ea99d413476abf65e0fc94cf42188432a7d86d38f2c1e377c0d138689695fea8953d2bd6850d8b564007616423ca7f936471066b20bf11eb6cdac6bb69320375ae6abb977f468ca3529affe3167e59550c4c85559dae7b6fe6240ece4c0e20868f8c629b1fcb2593f5b268029ba98dbd74cba7805b28c706cfa66650df2a43bc39a37477e3f000b4b891df217a62c5f341c46227d1f0663d6d000000000000000000", @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r0, 0xc) [ 229.421559][T19858] loop1: p1[EZD] p3 [ 229.425572][T19858] loop1: p1 size 11290111 extends beyond EOD, truncated [ 229.433824][T19858] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 229.475854][T19925] SELinux: duplicate or incompatible mount options [ 229.482331][T19924] FAULT_INJECTION: forcing a failure. [ 229.482331][T19924] name failslab, interval 1, probability 0, space 0, times 0 [ 229.495291][T19924] CPU: 0 PID: 19924 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 229.504112][T19924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.514194][T19924] Call Trace: [ 229.517476][T19924] dump_stack+0x137/0x19d [ 229.521811][T19924] should_fail+0x23c/0x250 19:54:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x10, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 229.526228][T19924] ? dup_mmap+0x38e/0x9c0 [ 229.530567][T19924] __should_failslab+0x81/0x90 [ 229.535385][T19924] should_failslab+0x5/0x20 [ 229.539983][T19924] kmem_cache_alloc+0x46/0x2f0 [ 229.544778][T19924] dup_mmap+0x38e/0x9c0 [ 229.548934][T19924] dup_mm+0x7c/0x210 [ 229.552833][T19924] copy_process+0x1203/0x2e00 [ 229.557520][T19924] kernel_clone+0x14b/0x680 [ 229.562017][T19924] __se_sys_clone3+0x194/0x1d0 [ 229.566775][T19924] ? ksys_write+0x148/0x180 19:54:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r1, 0xc) mlockall(0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="99f8e5f64073797ad2c29626699ca4d268ce0887491f2b585d75ecc4c8da5a7896ff24a96e4ba7eb2ac62918d277575c6993195e2514952396837584aa8135fd096d5bc10c7b22fddb46a0827f23428b6e1a77239ef358600eb066433f3d58c9fb7dc13ff5bd88ea59319e44b5804be10f9c8a7601138da4da444a7a12ba5d711a0700000000000000b006898653205d5252c9c6873de16cec53e90fbe19c74f49b418f8950620000000000000d72238801dbc814662309366b245e13e5247d7e23b90b7ab470cab63b4fde437cfb1a32234e11f4ffda5b5247d7d9b7ea51398d86b51b1f47dc7075f33fbedab8e897014127b92ef0eb80000000000000000000000004bc821721f9bf52a94ef56fe62b55f2197cfadfc7474c83b8fde16ab3682547100157382205e3faf7ae86d516d0ae6d043d358037ca685f9e405fd6a931db23ccd572a58406a699e1fbb36e196ff8f3291bb78f67eb529d1884310468fb8454011e2abb4354fbe90e25ce9f828ee00000000003da7fc04ff110366506c786202d7552f23e8e1730402a0e31c6b8ce040c024af6fae7d23632ac2568a707d933ca0d4c8388aa943fa7e26bdc50cece1e95d8cbfed36d3080c11a75ac5489c2c03aff8ea99d413476abf65e0fc94cf42188432a7d86d38f2c1e377c0d138689695fea8953d2bd6850d8b564007616423ca7f936471066b20bf11eb6cdac6bb69320375ae6abb977f468ca3529affe3167e59550c4c85559dae7b6fe6240ece4c0e20868f8c629b1fcb2593f5b268029ba98dbd74cba7805b28c706cfa66650df2a43bc39a37477e3f000b4b891df217a62c5f341c46227d1f0663d6d000000000000000000", @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r0, 0xc) [ 229.570571][T19932] SELinux: duplicate or incompatible mount options [ 229.571352][T19924] ? fpregs_assert_state_consistent+0x7d/0x90 [ 229.571383][T19924] ? exit_to_user_mode_prepare+0x65/0x190 [ 229.589697][T19924] __x64_sys_clone3+0x2d/0x40 [ 229.594555][T19924] do_syscall_64+0x4a/0x90 [ 229.598992][T19924] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 229.604955][T19924] RIP: 0033:0x4665d9 19:54:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x11, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 229.608848][T19924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 229.628482][T19924] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 229.636984][T19924] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 229.644952][T19924] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 229.652925][T19924] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 229.660983][T19924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 229.668976][T19924] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:54:49 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x58, 0xac141409}}, 0x1c) [ 229.688832][T19938] SELinux: duplicate or incompatible mount options [ 229.742279][T19948] loop1: detected capacity change from 0 to 264192 [ 229.761750][T19948] loop1: p1[EZD] p3 [ 229.765837][T19948] loop1: p1 size 11290111 extends beyond EOD, truncated [ 229.789037][T19948] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:54:52 executing program 4: unshare(0x2a000400) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x3938700}}, &(0x7f00000000c0)) set_mempolicy(0x3, &(0x7f0000000040)=0x1, 0x3) r0 = fork() unshare(0x10000200) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) r3 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r3, 0x409, 0x0) kcmp(r1, r0, 0x5, r2, r3) clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x12, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:52 executing program 3 (fault-call:3 fault-nth:43): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:52 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x60, 0xac141409}}, 0x1c) 19:54:52 executing program 1: syz_read_part_table(0x204000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:54:52 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x3f}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106c, 0x0, 0x800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) mmap(&(0x7f00002ef000/0x400000)=nil, 0x400000, 0x4, 0x12, r0, 0xd855a000) r1 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r1, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r1, 0xb) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r2, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2]}) shmat(r2, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r1, 0xc) [ 232.113589][T19976] SELinux: duplicate or incompatible mount options [ 232.125976][T19977] FAULT_INJECTION: forcing a failure. [ 232.125976][T19977] name failslab, interval 1, probability 0, space 0, times 0 [ 232.138693][T19977] CPU: 1 PID: 19977 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 232.139217][T19981] loop1: detected capacity change from 0 to 264192 [ 232.147453][T19977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.147468][T19977] Call Trace: [ 232.147475][T19977] dump_stack+0x137/0x19d [ 232.147499][T19977] should_fail+0x23c/0x250 [ 232.176699][T19977] ? anon_vma_clone+0x8d/0x380 [ 232.181477][T19977] __should_failslab+0x81/0x90 [ 232.187133][T19977] should_failslab+0x5/0x20 [ 232.191641][T19977] kmem_cache_alloc+0x46/0x2f0 [ 232.196466][T19977] anon_vma_clone+0x8d/0x380 [ 232.201048][T19977] anon_vma_fork+0x54/0x2b0 [ 232.205543][T19977] dup_mmap+0x49c/0x9c0 [ 232.209872][T19977] dup_mm+0x7c/0x210 [ 232.213787][T19977] copy_process+0x1203/0x2e00 [ 232.218551][T19977] kernel_clone+0x14b/0x680 [ 232.223401][T19977] __se_sys_clone3+0x194/0x1d0 [ 232.230190][T19977] ? ksys_write+0x148/0x180 [ 232.234683][T19977] ? fpregs_assert_state_consistent+0x7d/0x90 [ 232.240760][T19977] ? exit_to_user_mode_prepare+0x65/0x190 [ 232.246675][T19977] __x64_sys_clone3+0x2d/0x40 [ 232.251372][T19977] do_syscall_64+0x4a/0x90 [ 232.255812][T19977] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 232.261714][T19977] RIP: 0033:0x4665d9 [ 232.265624][T19977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 232.285227][T19977] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 232.293670][T19977] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 232.301635][T19977] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 19:54:52 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x78, 0xac141409}}, 0x1c) [ 232.309708][T19977] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 232.317681][T19977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 232.325653][T19977] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:54:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x25, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r0, 0xc) [ 232.372760][T19981] loop1: p1[EZD] p3 [ 232.391804][T19981] loop1: p1 size 11290111 extends beyond EOD, truncated 19:54:52 executing program 3 (fault-call:3 fault-nth:44): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 232.431599][T19981] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 232.458931][T20006] FAULT_INJECTION: forcing a failure. [ 232.458931][T20006] name failslab, interval 1, probability 0, space 0, times 0 [ 232.471680][T20006] CPU: 0 PID: 20006 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 232.480529][T20006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.490681][T20006] Call Trace: [ 232.493965][T20006] dump_stack+0x137/0x19d [ 232.498303][T20006] should_fail+0x23c/0x250 [ 232.502733][T20006] ? anon_vma_clone+0x8d/0x380 [ 232.507561][T20006] __should_failslab+0x81/0x90 [ 232.512586][T20006] should_failslab+0x5/0x20 [ 232.517083][T20006] kmem_cache_alloc+0x46/0x2f0 [ 232.521918][T20006] anon_vma_clone+0x8d/0x380 [ 232.526508][T20006] anon_vma_fork+0x54/0x2b0 [ 232.531016][T20006] dup_mmap+0x49c/0x9c0 [ 232.535189][T20006] dup_mm+0x7c/0x210 [ 232.539094][T20006] copy_process+0x1203/0x2e00 [ 232.543821][T20006] kernel_clone+0x14b/0x680 [ 232.548385][T20006] __se_sys_clone3+0x194/0x1d0 [ 232.553239][T20006] ? ksys_write+0x148/0x180 [ 232.557787][T20006] ? fpregs_assert_state_consistent+0x7d/0x90 [ 232.563884][T20006] ? exit_to_user_mode_prepare+0x65/0x190 [ 232.569705][T20006] __x64_sys_clone3+0x2d/0x40 [ 232.574478][T20006] do_syscall_64+0x4a/0x90 [ 232.578893][T20006] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 232.584806][T20006] RIP: 0033:0x4665d9 [ 232.588695][T20006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 232.608413][T20006] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 232.616912][T20006] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 232.624888][T20006] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 19:54:52 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfc, 0xac141409}}, 0x1c) 19:54:52 executing program 1: syz_read_part_table(0x300000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 232.632850][T20006] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 232.640822][T20006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 232.648787][T20006] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:54:52 executing program 1: syz_read_part_table(0x37dc12502000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:54:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r0, 0xc) 19:54:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x48, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:52 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x103, 0xac141409}}, 0x1c) 19:54:52 executing program 4: unshare(0x2a000400) set_mempolicy(0x3, &(0x7f0000000040)=0x1, 0x3) r0 = fork() getpgrp(r0) clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x15}, 0x0, 0x0, 0x0}, 0x58) 19:54:52 executing program 3 (fault-call:3 fault-nth:45): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 232.810973][T20042] loop1: detected capacity change from 0 to 264192 [ 232.815874][T20041] SELinux: duplicate or incompatible mount options [ 232.820404][T20044] FAULT_INJECTION: forcing a failure. [ 232.820404][T20044] name failslab, interval 1, probability 0, space 0, times 0 [ 232.836794][T20044] CPU: 1 PID: 20044 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 232.845737][T20044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.855881][T20044] Call Trace: [ 232.859162][T20044] dump_stack+0x137/0x19d [ 232.863492][T20044] should_fail+0x23c/0x250 [ 232.867914][T20044] ? anon_vma_fork+0x117/0x2b0 [ 232.872756][T20044] __should_failslab+0x81/0x90 [ 232.877562][T20044] should_failslab+0x5/0x20 [ 232.882096][T20044] kmem_cache_alloc+0x46/0x2f0 [ 232.886871][T20044] ? anon_vma_fork+0xb1/0x2b0 [ 232.891576][T20044] anon_vma_fork+0x117/0x2b0 [ 232.896294][T20044] dup_mmap+0x49c/0x9c0 [ 232.900452][T20044] dup_mm+0x7c/0x210 [ 232.904351][T20044] copy_process+0x1203/0x2e00 [ 232.909040][T20044] kernel_clone+0x14b/0x680 [ 232.913538][T20044] __se_sys_clone3+0x194/0x1d0 [ 232.918308][T20044] ? ksys_write+0x148/0x180 [ 232.922813][T20044] ? fpregs_assert_state_consistent+0x7d/0x90 [ 232.928892][T20044] ? exit_to_user_mode_prepare+0x65/0x190 [ 232.934657][T20044] __x64_sys_clone3+0x2d/0x40 [ 232.939339][T20044] do_syscall_64+0x4a/0x90 [ 232.943767][T20044] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 232.949665][T20044] RIP: 0033:0x4665d9 19:54:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmget(0x2, 0x3000, 0x1, &(0x7f00000ff000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) 19:54:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x4c, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:52 executing program 4: unshare(0x2a000400) unshare(0x20000000) unshare(0x20000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @private=0xa010102}, 0x10) set_mempolicy(0x3, &(0x7f0000000040)=0x1, 0x3) r1 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1], 0x1}, 0x58) [ 232.953552][T20044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 232.973162][T20044] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 232.982356][T20044] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 232.990334][T20044] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 232.998308][T20044] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 19:54:53 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x1f4, 0xac141409}}, 0x1c) [ 233.006366][T20044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 233.014338][T20044] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:54:53 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x220, 0xac141409}}, 0x1c) 19:54:53 executing program 4: unshare(0x2a000400) set_mempolicy(0x3, &(0x7f0000000040)=0x1, 0x3) r0 = syz_open_pts(0xffffffffffffffff, 0x802) close(r0) r1 = fork() clone3(&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1], 0x3b}, 0x58) [ 233.055210][T20066] SELinux: duplicate or incompatible mount options [ 233.064364][T20042] loop1: p1[EZD] p3 [ 233.073962][T20042] loop1: p1 size 11290111 extends beyond EOD, truncated [ 233.095112][T20042] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 233.184252][T20064] print_req_error: 1 callbacks suppressed [ 233.184266][T20064] blk_update_request: I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 233.190154][T20057] blk_update_request: I/O error, dev loop1, sector 264033 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 233.205644][T20042] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 233.237618][ T702] blk_update_request: I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 233.248995][ T702] Buffer I/O error on dev loop1p1, logical block 33008, async page read [ 233.261069][T20042] loop1: detected capacity change from 0 to 264192 19:54:53 executing program 1: syz_read_part_table(0x400000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:54:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x60, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:53 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x300, 0xac141409}}, 0x1c) 19:54:53 executing program 3 (fault-call:3 fault-nth:46): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:53 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x6, 0x22600) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000040)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x2c}}, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="338a", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fbdbdf2501000000080008000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="080002000000000008000500e0000001060006000100000008000800000000000800090004000000"], 0x54}, 0x1, 0x0, 0x0, 0x20008081}, 0x10000050) unshare(0x2a000400) set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x3) r5 = fork() ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000240)={'tunl0\x00', &(0x7f00000001c0)={'syztnl2\x00', r4, 0x20, 0x40, 0x8, 0x0, {{0xb, 0x4, 0x3, 0x7, 0x2c, 0x66, 0x0, 0x79, 0x2f, 0x0, @multicast1, @multicast2, {[@lsrr={0x83, 0xf, 0x98, [@rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @local]}, @ssrr={0x89, 0x7, 0x9b, [@multicast2]}]}}}}}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000280)={r6, 0x1, 0x6, @remote}, 0x10) clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x2d}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r5], 0x1}, 0x58) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) 19:54:53 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r1 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r1, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r1, 0xb) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x5, 0x3f, 0x4, 0xc4, 0x0, 0x588, 0xa3, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x204, 0x0, 0x6, 0x1, 0x3, 0x200, 0x40, 0x0, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0xb, r0, 0x3) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r2, 0xc) mlockall(0x5) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2]}) r3 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r3, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(r3, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r1, 0xc) [ 233.300936][T20042] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 19:54:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x68, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 233.406331][T20113] FAULT_INJECTION: forcing a failure. [ 233.406331][T20113] name failslab, interval 1, probability 0, space 0, times 0 [ 233.409982][T20123] loop1: detected capacity change from 0 to 264192 [ 233.419093][T20113] CPU: 1 PID: 20113 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 233.434321][T20113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.434335][T20113] Call Trace: [ 233.434342][T20113] dump_stack+0x137/0x19d [ 233.452177][T20113] should_fail+0x23c/0x250 [ 233.456646][T20113] ? anon_vma_clone+0x8d/0x380 [ 233.461408][T20113] __should_failslab+0x81/0x90 [ 233.466189][T20113] should_failslab+0x5/0x20 [ 233.470743][T20113] kmem_cache_alloc+0x46/0x2f0 [ 233.475558][T20113] ? avc_has_perm_noaudit+0x19a/0x240 [ 233.476166][T20120] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 233.480937][T20113] anon_vma_clone+0x8d/0x380 [ 233.480963][T20113] anon_vma_fork+0x54/0x2b0 [ 233.481026][T20113] dup_mmap+0x49c/0x9c0 [ 233.502451][T20113] dup_mm+0x7c/0x210 19:54:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x6c, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 233.506349][T20113] copy_process+0x1203/0x2e00 [ 233.511205][T20113] kernel_clone+0x14b/0x680 [ 233.515796][T20113] __se_sys_clone3+0x194/0x1d0 [ 233.520563][T20113] ? ksys_write+0x148/0x180 [ 233.525069][T20113] ? fpregs_assert_state_consistent+0x7d/0x90 [ 233.531145][T20113] ? exit_to_user_mode_prepare+0x65/0x190 [ 233.536870][T20113] __x64_sys_clone3+0x2d/0x40 [ 233.541545][T20113] do_syscall_64+0x4a/0x90 [ 233.545990][T20113] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 233.551892][T20113] RIP: 0033:0x4665d9 [ 233.555811][T20113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 233.575418][T20113] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 233.584091][T20113] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 233.592062][T20113] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 19:54:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x74, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 233.600028][T20113] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 233.608085][T20113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 233.616063][T20113] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 233.634877][T20123] loop1: p1[EZD] p3 [ 233.639810][T20123] loop1: p1 size 11290111 extends beyond EOD, truncated 19:54:53 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x301, 0xac141409}}, 0x1c) [ 233.659116][T20123] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 233.669516][T20120] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 19:54:53 executing program 3 (fault-call:3 fault-nth:47): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:53 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x3e8, 0xac141409}}, 0x1c) 19:54:53 executing program 1: syz_read_part_table(0x402aa0400000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:54:53 executing program 4: unshare(0x2a000400) set_mempolicy(0x3, &(0x7f0000000040)=0x1, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) unshare(0x980) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) unshare(0x200) unshare(0x0) [ 233.814952][T20162] FAULT_INJECTION: forcing a failure. [ 233.814952][T20162] name failslab, interval 1, probability 0, space 0, times 0 [ 233.827599][T20162] CPU: 0 PID: 20162 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 233.836360][T20162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.846425][T20162] Call Trace: [ 233.849709][T20162] dump_stack+0x137/0x19d [ 233.854045][T20162] should_fail+0x23c/0x250 [ 233.858453][T20162] ? dup_mmap+0x38e/0x9c0 [ 233.862781][T20162] __should_failslab+0x81/0x90 [ 233.867537][T20162] should_failslab+0x5/0x20 [ 233.872125][T20162] kmem_cache_alloc+0x46/0x2f0 [ 233.876889][T20162] dup_mmap+0x38e/0x9c0 [ 233.881056][T20162] dup_mm+0x7c/0x210 [ 233.884949][T20162] copy_process+0x1203/0x2e00 [ 233.889632][T20162] kernel_clone+0x14b/0x680 [ 233.894164][T20162] __se_sys_clone3+0x194/0x1d0 [ 233.898934][T20162] ? ksys_write+0x148/0x180 [ 233.903516][T20162] ? fpregs_assert_state_consistent+0x7d/0x90 [ 233.909934][T20162] ? exit_to_user_mode_prepare+0x65/0x190 [ 233.915671][T20162] __x64_sys_clone3+0x2d/0x40 [ 233.920351][T20162] do_syscall_64+0x4a/0x90 [ 233.924788][T20162] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 233.930768][T20162] RIP: 0033:0x4665d9 [ 233.934715][T20162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 233.954324][T20162] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 19:54:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x7a, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:53 executing program 4: unshare(0x2a000400) set_mempolicy(0x3, &(0x7f0000000040)=0x1, 0x3) r0 = fork() unshare(0x40000000) clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:53 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x500, 0xac141409}}, 0x1c) [ 233.962917][T20162] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 233.970975][T20162] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 233.978970][T20162] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 233.986936][T20162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 233.995036][T20162] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 234.008704][T20166] loop1: detected capacity change from 0 to 264192 [ 234.053221][T20166] loop1: p1[EZD] p3 [ 234.057332][T20166] loop1: p1 size 11290111 extends beyond EOD, truncated [ 234.078209][T20166] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:54:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) r2 = shmat(r1, &(0x7f00003c6000/0x1000)=nil, 0x5000) shmdt(r2) shmctl$SHM_UNLOCK(r0, 0xc) 19:54:54 executing program 3 (fault-call:3 fault-nth:48): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x300, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x5a0, 0xac141409}}, 0x1c) 19:54:54 executing program 1: syz_read_part_table(0x500000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:54:54 executing program 4: unshare(0x2a000400) set_mempolicy(0x3, &(0x7f0000000040)=0x1, 0x3) unshare(0x10000100) r0 = fork() socket(0x1a, 0x2, 0x5) clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 234.300399][T20236] loop1: detected capacity change from 0 to 264192 [ 234.305377][T20230] FAULT_INJECTION: forcing a failure. [ 234.305377][T20230] name failslab, interval 1, probability 0, space 0, times 0 [ 234.320023][T20230] CPU: 1 PID: 20230 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 234.328776][T20230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.332121][T20232] SELinux: duplicate or incompatible mount options [ 234.338823][T20230] Call Trace: [ 234.338832][T20230] dump_stack+0x137/0x19d [ 234.353167][T20230] should_fail+0x23c/0x250 [ 234.357646][T20230] ? anon_vma_clone+0x8d/0x380 [ 234.362409][T20230] __should_failslab+0x81/0x90 [ 234.367194][T20230] should_failslab+0x5/0x20 [ 234.371683][T20230] kmem_cache_alloc+0x46/0x2f0 [ 234.376544][T20230] ? avc_has_perm_noaudit+0x19a/0x240 [ 234.381962][T20230] anon_vma_clone+0x8d/0x380 [ 234.386604][T20230] anon_vma_fork+0x54/0x2b0 [ 234.391109][T20230] dup_mmap+0x49c/0x9c0 [ 234.395383][T20230] dup_mm+0x7c/0x210 19:54:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x500, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'gretap0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r0, 0xc) [ 234.399275][T20230] copy_process+0x1203/0x2e00 [ 234.403958][T20230] kernel_clone+0x14b/0x680 [ 234.408455][T20230] __se_sys_clone3+0x194/0x1d0 [ 234.413213][T20230] ? ksys_write+0x148/0x180 [ 234.417717][T20230] ? fpregs_assert_state_consistent+0x7d/0x90 [ 234.424045][T20230] ? exit_to_user_mode_prepare+0x65/0x190 [ 234.429857][T20230] __x64_sys_clone3+0x2d/0x40 [ 234.434539][T20230] do_syscall_64+0x4a/0x90 [ 234.438962][T20230] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 234.444855][T20230] RIP: 0033:0x4665d9 [ 234.448777][T20230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 234.459344][T20249] SELinux: duplicate or incompatible mount options [ 234.468385][T20230] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 234.468409][T20230] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 234.491342][T20230] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 234.499313][T20230] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 234.507283][T20230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 234.515244][T20230] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:54:54 executing program 4: unshare(0x2a000400) set_mempolicy(0x3, &(0x7f0000000040)=0x1, 0x3) unshare(0x10000100) r0 = fork() socket(0x1a, 0x2, 0x5) clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x5c8, 0xac141409}}, 0x1c) 19:54:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x600, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 234.543206][T20236] loop1: p1[EZD] p3 [ 234.551804][T20236] loop1: p1 size 11290111 extends beyond EOD, truncated [ 234.572418][T20236] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:54:54 executing program 3 (fault-call:3 fault-nth:49): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x600, 0xac141409}}, 0x1c) [ 234.624116][T20264] SELinux: duplicate or incompatible mount options [ 234.636739][T20236] loop1: detected capacity change from 0 to 264192 19:54:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x700, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 234.682457][T20236] loop1: p1[EZD] p3 [ 234.686924][T20236] loop1: p1 size 11290111 extends beyond EOD, truncated [ 234.715963][T20277] FAULT_INJECTION: forcing a failure. [ 234.715963][T20277] name failslab, interval 1, probability 0, space 0, times 0 19:54:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r1, 0xc) r2 = shmget$private(0x0, 0x2000, 0x54000000, &(0x7f00001ea000/0x2000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmget(0x3, 0x1000, 0x8, &(0x7f0000064000/0x1000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) r3 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r3, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(r3, &(0x7f0000047000/0x3000)=nil, 0x2000) shmctl$SHM_UNLOCK(r0, 0xc) [ 234.728791][T20277] CPU: 1 PID: 20277 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 234.737552][T20277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.747605][T20277] Call Trace: [ 234.750882][T20277] dump_stack+0x137/0x19d [ 234.752695][T20286] SELinux: duplicate or incompatible mount options [ 234.755209][T20277] should_fail+0x23c/0x250 [ 234.763059][T20236] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 234.766285][T20277] ? anon_vma_clone+0x8d/0x380 [ 234.766310][T20277] __should_failslab+0x81/0x90 19:54:54 executing program 1: syz_read_part_table(0x600000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:54:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r0, 0xc) [ 234.782981][T20277] should_failslab+0x5/0x20 [ 234.787480][T20277] kmem_cache_alloc+0x46/0x2f0 [ 234.792236][T20277] anon_vma_clone+0x8d/0x380 [ 234.796827][T20277] anon_vma_fork+0x54/0x2b0 [ 234.801443][T20277] dup_mmap+0x49c/0x9c0 [ 234.805714][T20277] dup_mm+0x7c/0x210 [ 234.810393][T20277] copy_process+0x1203/0x2e00 [ 234.815088][T20277] kernel_clone+0x14b/0x680 [ 234.819939][T20277] __se_sys_clone3+0x194/0x1d0 [ 234.824711][T20277] ? ksys_write+0x148/0x180 19:54:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x900, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 234.829211][T20277] ? fpregs_assert_state_consistent+0x7d/0x90 [ 234.835368][T20277] ? exit_to_user_mode_prepare+0x65/0x190 [ 234.841200][T20277] __x64_sys_clone3+0x2d/0x40 [ 234.845879][T20277] do_syscall_64+0x4a/0x90 [ 234.850332][T20277] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 234.856274][T20277] RIP: 0033:0x4665d9 [ 234.860206][T20277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 234.874906][T20299] SELinux: duplicate or incompatible mount options [ 234.879903][T20277] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 234.879926][T20277] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 234.879938][T20277] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 234.879948][T20277] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 234.879958][T20277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 19:54:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x700, 0xac141409}}, 0x1c) [ 234.879968][T20277] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:54:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x810, 0xac141409}}, 0x1c) 19:54:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xa00, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 234.978591][T20303] loop1: detected capacity change from 0 to 264192 [ 235.034735][T20303] loop1: p1[EZD] p3 [ 235.044242][T20303] loop1: p1 size 11290111 extends beyond EOD, truncated [ 235.051777][T20303] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:54:55 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xf00, 0xac141409}}, 0x1c) 19:54:55 executing program 1: syz_read_part_table(0x604000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 235.076044][T20320] SELinux: duplicate or incompatible mount options 19:54:55 executing program 3 (fault-call:3 fault-nth:50): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRESHEX]}) shmat(0x0, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r0, 0xc) 19:54:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xb00, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 235.216917][T20336] loop1: detected capacity change from 0 to 264192 [ 235.236613][T20342] FAULT_INJECTION: forcing a failure. [ 235.236613][T20342] name failslab, interval 1, probability 0, space 0, times 0 [ 235.249446][T20342] CPU: 0 PID: 20342 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 235.258213][T20342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.268274][T20342] Call Trace: [ 235.271565][T20342] dump_stack+0x137/0x19d [ 235.275994][T20342] should_fail+0x23c/0x250 [ 235.280417][T20342] ? anon_vma_fork+0xb1/0x2b0 [ 235.285106][T20342] __should_failslab+0x81/0x90 [ 235.289879][T20342] should_failslab+0x5/0x20 [ 235.294380][T20342] kmem_cache_alloc+0x46/0x2f0 [ 235.298109][T20350] SELinux: duplicate or incompatible mount options [ 235.299160][T20342] anon_vma_fork+0xb1/0x2b0 [ 235.310252][T20342] dup_mmap+0x49c/0x9c0 [ 235.314422][T20342] dup_mm+0x7c/0x210 [ 235.318315][T20342] copy_process+0x1203/0x2e00 [ 235.323004][T20342] kernel_clone+0x14b/0x680 [ 235.327510][T20342] __se_sys_clone3+0x194/0x1d0 [ 235.332358][T20342] ? ksys_write+0x148/0x180 [ 235.336873][T20342] ? fpregs_assert_state_consistent+0x7d/0x90 [ 235.343028][T20342] ? exit_to_user_mode_prepare+0x65/0x190 [ 235.348814][T20342] __x64_sys_clone3+0x2d/0x40 [ 235.353527][T20342] do_syscall_64+0x4a/0x90 [ 235.357957][T20342] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 235.363972][T20342] RIP: 0033:0x4665d9 [ 235.367862][T20342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 235.387579][T20342] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 235.395995][T20342] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 235.404056][T20342] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 235.412029][T20342] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 235.420081][T20342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 235.428131][T20342] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 235.479070][T20336] loop1: p1[EZD] p3 [ 235.483426][T20336] loop1: p1 size 11290111 extends beyond EOD, truncated [ 235.508131][T20336] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:54:55 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:54:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xc00, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:55 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x1008, 0xac141409}}, 0x1c) 19:54:55 executing program 3 (fault-call:3 fault-nth:51): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mlockall(0x3) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r0, 0xc) [ 235.586592][T20336] loop1: detected capacity change from 0 to 264192 [ 235.602979][T20377] SELinux: duplicate or incompatible mount options [ 235.618181][T20378] FAULT_INJECTION: forcing a failure. [ 235.618181][T20378] name failslab, interval 1, probability 0, space 0, times 0 [ 235.630822][T20378] CPU: 1 PID: 20378 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 235.639648][T20378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.649723][T20378] Call Trace: [ 235.653089][T20378] dump_stack+0x137/0x19d [ 235.657427][T20378] should_fail+0x23c/0x250 [ 235.661845][T20378] ? anon_vma_fork+0x117/0x2b0 [ 235.666700][T20378] __should_failslab+0x81/0x90 [ 235.671464][T20378] should_failslab+0x5/0x20 [ 235.675965][T20378] kmem_cache_alloc+0x46/0x2f0 [ 235.680782][T20378] ? anon_vma_fork+0xb1/0x2b0 19:54:55 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x1100, 0xac141409}}, 0x1c) 19:54:55 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:54:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xd00, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 235.685546][T20378] anon_vma_fork+0x117/0x2b0 [ 235.690311][T20378] dup_mmap+0x49c/0x9c0 [ 235.694466][T20378] dup_mm+0x7c/0x210 [ 235.698425][T20378] copy_process+0x1203/0x2e00 [ 235.703096][T20378] kernel_clone+0x14b/0x680 [ 235.707626][T20378] __se_sys_clone3+0x194/0x1d0 [ 235.712400][T20378] ? ksys_write+0x148/0x180 [ 235.716912][T20378] ? fpregs_assert_state_consistent+0x7d/0x90 [ 235.723055][T20378] ? exit_to_user_mode_prepare+0x65/0x190 [ 235.728787][T20378] __x64_sys_clone3+0x2d/0x40 [ 235.733459][T20378] do_syscall_64+0x4a/0x90 [ 235.737919][T20378] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 235.743850][T20378] RIP: 0033:0x4665d9 [ 235.747740][T20378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 235.767358][T20378] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 235.775771][T20378] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 235.783926][T20378] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 235.791960][T20378] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 235.799927][T20378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 235.807899][T20378] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 235.817461][T20336] loop1: p1[EZD] p3 [ 235.822231][T20336] loop1: p1 size 11290111 extends beyond EOD, truncated 19:54:55 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:54:55 executing program 1: syz_read_part_table(0x700000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 235.839215][T20336] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 235.844535][T20389] SELinux: duplicate or incompatible mount options 19:54:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xe00, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:55 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x2002, 0xac141409}}, 0x1c) 19:54:55 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) [ 235.943450][T20399] SELinux: duplicate or incompatible mount options [ 235.943536][T20396] loop1: detected capacity change from 0 to 264192 19:54:55 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x2800, 0xac141409}}, 0x1c) 19:54:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x1020, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:55 executing program 3 (fault-call:3 fault-nth:52): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 235.993874][T20396] loop1: p1[EZD] p3 [ 235.998712][T20396] loop1: p1 size 11290111 extends beyond EOD, truncated [ 236.006572][T20396] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 236.083604][T20423] FAULT_INJECTION: forcing a failure. [ 236.083604][T20423] name failslab, interval 1, probability 0, space 0, times 0 [ 236.096257][T20423] CPU: 0 PID: 20423 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 236.105029][T20423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.115093][T20423] Call Trace: [ 236.118448][T20423] dump_stack+0x137/0x19d [ 236.122789][T20423] should_fail+0x23c/0x250 [ 236.127241][T20423] ? dup_mmap+0x38e/0x9c0 [ 236.131619][T20423] __should_failslab+0x81/0x90 [ 236.136388][T20423] should_failslab+0x5/0x20 [ 236.140894][T20423] kmem_cache_alloc+0x46/0x2f0 [ 236.145674][T20423] dup_mmap+0x38e/0x9c0 [ 236.149834][T20423] dup_mm+0x7c/0x210 [ 236.153729][T20423] copy_process+0x1203/0x2e00 [ 236.158403][T20423] kernel_clone+0x14b/0x680 [ 236.163104][T20423] __se_sys_clone3+0x194/0x1d0 [ 236.167987][T20423] ? ksys_write+0x148/0x180 [ 236.172484][T20423] ? fpregs_assert_state_consistent+0x7d/0x90 [ 236.178748][T20423] ? exit_to_user_mode_prepare+0x65/0x190 [ 236.184473][T20423] __x64_sys_clone3+0x2d/0x40 [ 236.189244][T20423] do_syscall_64+0x4a/0x90 [ 236.193662][T20423] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 236.199586][T20423] RIP: 0033:0x4665d9 [ 236.203553][T20423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 236.223488][T20423] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 236.231937][T20423] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 236.239913][T20423] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 236.247994][T20423] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 236.256172][T20423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 236.264144][T20423] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:54:56 executing program 1: syz_read_part_table(0x800000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:54:56 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:54:56 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x3000, 0xac141409}}, 0x1c) 19:54:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x1100, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x5000, 0x2, &(0x7f0000094000/0x5000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r1, 0xc) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000600)=ANY=[@ANYRES64=r2, @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/227) 19:54:56 executing program 3 (fault-call:3 fault-nth:53): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r2, 0xb) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r0, 0xc) [ 236.636936][T20445] loop1: detected capacity change from 0 to 264192 [ 236.672088][T20451] FAULT_INJECTION: forcing a failure. [ 236.672088][T20451] name failslab, interval 1, probability 0, space 0, times 0 [ 236.685001][T20451] CPU: 1 PID: 20451 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 236.693355][T20445] loop1: p1[EZD] p3 [ 236.693754][T20451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.704284][T20445] loop1: p1 size 11290111 extends beyond EOD, [ 236.709770][T20451] Call Trace: [ 236.709781][T20451] dump_stack+0x137/0x19d [ 236.715937][T20445] truncated [ 236.719270][T20451] should_fail+0x23c/0x250 [ 236.731163][T20451] ? dup_mmap+0x38e/0x9c0 [ 236.735506][T20451] __should_failslab+0x81/0x90 [ 236.740447][T20451] should_failslab+0x5/0x20 [ 236.744950][T20451] kmem_cache_alloc+0x46/0x2f0 [ 236.749726][T20451] ? anon_vma_fork+0x273/0x2b0 [ 236.754490][T20451] dup_mmap+0x38e/0x9c0 [ 236.758655][T20451] dup_mm+0x7c/0x210 [ 236.762620][T20451] copy_process+0x1203/0x2e00 [ 236.767397][T20451] kernel_clone+0x14b/0x680 [ 236.771923][T20451] __se_sys_clone3+0x194/0x1d0 [ 236.776713][T20451] ? ksys_write+0x148/0x180 [ 236.781209][T20451] ? fpregs_assert_state_consistent+0x7d/0x90 19:54:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x1200, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:56 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x3f00, 0xac141409}}, 0x1c) 19:54:56 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) [ 236.787280][T20451] ? exit_to_user_mode_prepare+0x65/0x190 [ 236.792994][T20451] __x64_sys_clone3+0x2d/0x40 [ 236.797744][T20451] do_syscall_64+0x4a/0x90 [ 236.802271][T20451] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 236.808167][T20451] RIP: 0033:0x4665d9 [ 236.812057][T20451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 236.831663][T20451] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 236.834005][T20445] loop1: p3 size 1912633224 extends beyond EOD, [ 236.840071][T20451] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 236.840086][T20451] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 236.846498][T20445] truncated [ 236.854428][T20451] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 236.873470][T20451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 236.881440][T20451] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:54:56 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:54:56 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x4000, 0xac141409}}, 0x1c) 19:54:56 executing program 1: syz_read_part_table(0xa00000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:54:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x1539, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:56 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:54:56 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x5800, 0xac141409}}, 0x1c) 19:54:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x2000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 237.038478][T20488] loop1: detected capacity change from 0 to 264192 [ 237.060787][T20488] loop1: p1[EZD] p3 [ 237.066565][T20488] loop1: p1 size 11290111 extends beyond EOD, truncated 19:54:57 executing program 3 (fault-call:3 fault-nth:54): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 237.114705][T20488] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 237.188033][T20517] FAULT_INJECTION: forcing a failure. [ 237.188033][T20517] name failslab, interval 1, probability 0, space 0, times 0 [ 237.200683][T20517] CPU: 1 PID: 20517 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 237.209532][T20517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.219666][T20517] Call Trace: [ 237.222940][T20517] dump_stack+0x137/0x19d [ 237.227277][T20517] should_fail+0x23c/0x250 [ 237.231705][T20517] ? anon_vma_clone+0x8d/0x380 19:54:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mlockall(0x2) r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r0, 0x409, 0x0) r1 = epoll_create(0xff) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000100)=0x473, 0x1) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000398000/0x4000)=nil, 0x1000) shmctl$SHM_LOCK(r2, 0xb) r3 = shmget$private(0x0, 0x3000, 0x1000, &(0x7f00002bb000/0x3000)=nil) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r3, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRESHEX=r3]}) shmat(r3, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) shmctl$IPC_RMID(r3, 0x0) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r2, 0xc) 19:54:57 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:54:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x2010, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:57 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x6000, 0xac141409}}, 0x1c) 19:54:57 executing program 1: syz_read_part_table(0xb00000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 237.237046][T20517] __should_failslab+0x81/0x90 [ 237.241817][T20517] should_failslab+0x5/0x20 [ 237.246348][T20517] kmem_cache_alloc+0x46/0x2f0 [ 237.251117][T20517] anon_vma_clone+0x8d/0x380 [ 237.255725][T20517] anon_vma_fork+0x54/0x2b0 [ 237.260240][T20517] dup_mmap+0x49c/0x9c0 [ 237.264419][T20517] dup_mm+0x7c/0x210 [ 237.268312][T20517] copy_process+0x1203/0x2e00 [ 237.272983][T20517] kernel_clone+0x14b/0x680 [ 237.277481][T20517] __se_sys_clone3+0x194/0x1d0 [ 237.282300][T20517] ? ksys_write+0x148/0x180 [ 237.286799][T20517] ? fpregs_assert_state_consistent+0x7d/0x90 [ 237.292884][T20517] ? exit_to_user_mode_prepare+0x65/0x190 [ 237.298611][T20517] __x64_sys_clone3+0x2d/0x40 [ 237.303292][T20517] do_syscall_64+0x4a/0x90 [ 237.307734][T20517] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 237.313766][T20517] RIP: 0033:0x4665d9 [ 237.317654][T20517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 237.337275][T20517] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 237.345725][T20517] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 237.353721][T20517] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 237.361682][T20517] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 237.370510][T20517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 237.378484][T20517] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:54:57 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x7800, 0xac141409}}, 0x1c) 19:54:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x2500, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:57 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) [ 237.416702][T20537] loop1: detected capacity change from 0 to 264192 19:54:57 executing program 3 (fault-call:3 fault-nth:55): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 237.470671][T20537] loop1: p1[EZD] p3 [ 237.474839][T20537] loop1: p1 size 11290111 extends beyond EOD, truncated 19:54:57 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:54:57 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x80fe, 0xac141409}}, 0x1c) 19:54:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x3915, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 237.533137][T20537] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 237.581546][T20558] FAULT_INJECTION: forcing a failure. [ 237.581546][T20558] name failslab, interval 1, probability 0, space 0, times 0 [ 237.594197][T20558] CPU: 0 PID: 20558 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 237.603045][T20558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.613198][T20558] Call Trace: [ 237.616477][T20558] dump_stack+0x137/0x19d [ 237.620818][T20558] should_fail+0x23c/0x250 [ 237.625285][T20558] ? anon_vma_clone+0x8d/0x380 [ 237.630143][T20558] __should_failslab+0x81/0x90 [ 237.634908][T20558] should_failslab+0x5/0x20 [ 237.639407][T20558] kmem_cache_alloc+0x46/0x2f0 [ 237.644179][T20558] anon_vma_clone+0x8d/0x380 [ 237.649635][T20558] anon_vma_fork+0x54/0x2b0 [ 237.654176][T20558] dup_mmap+0x49c/0x9c0 [ 237.658373][T20558] dup_mm+0x7c/0x210 [ 237.662271][T20558] copy_process+0x1203/0x2e00 [ 237.666943][T20558] kernel_clone+0x14b/0x680 [ 237.671448][T20558] __se_sys_clone3+0x194/0x1d0 [ 237.676215][T20558] ? ksys_write+0x148/0x180 19:54:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000127000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(r2, &(0x7f0000ffa000/0x4000)=nil, 0x1000) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="99f8e5f64073797ad2c29626699ca4d268ce0887491f2b585d75ecc4c8da5a7896ff24a96e4ba7eb2ac62918d277575c6993195e2514952396837584aa8135fd096d5bc10c7b22fddb46a0827f23428b6e1a77239ef358600eb066433f3d58c9fb7dc13ff5bd88ea59319e44b5804be10f9c8a7601138da4da444a7a12ba5d711a0700000000000000b006898653205d5252c9c6873de16cec53e90fbe19c74f49b418f8950620000000000000d72238801dbc814662309366b245e13e5247d7e23b90b7ab470cab63b4fde437cfb1a32234e11f4ffda5b5247d7d9b7ea51398d86b51b1f47dc7075f33fbedab8e897014127b92ef0eb80000000000000000000000004bc821721f9bf52a94ef56fe62b55f2197cfadfc7474c83b8fde16ab3682547100157382205e3faf7ae86d516d0ae6d043d358037ca685f9e405fd6a931db23ccd572a58406a699e1fbb36e196ff8f3291bb78f67eb529d1884310468fb8454011e2abb4354fbe90e25ce9f828ee00000000003da7fc04ff110366506c786202d7552f23e8e1730402a0e31c6b8ce040c024af6fae7d23632ac2568a707d933ca0d4c8388aa943fa7e26bdc50cece1e95d8cbfed36d3080c11a75ac5489c2c03aff8ea99d413476abf65e0fc94cf42188432a7d86d38f2c1e377c0d138689695fea8953d2bd6850d8b564007616423ca7f936471066b20bf11eb6cdac6bb69320375ae6abb977f468ca3529affe3167e59550c4c85559dae7b6fe6240ece4c0e20868f8c629b1fcb2593f5b268029ba98dbd74cba7805b28c706cfa66650df2a43bc39a37477e3f000b4b891df217a62c5f341c46227d1f0663d6d0000000000000000003a491d98c3c1f4b935c9057302a2aade3863bf42146318ed1e438d11d47329d9f1efdca137c65fed9d154b25d598d7b4c5734b9b373f9f1757abb1fab03be8aaef15dc999c3fbdd6b3fefe2d", @ANYRESHEX=r1]}) r3 = shmget$private(0x0, 0x3000, 0x80, &(0x7f00002aa000/0x3000)=nil) shmat(r3, &(0x7f0000257000/0x3000)=nil, 0x4000) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) mlockall(0x0) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000028a000/0x2000)=nil, 0x6000) shmctl$SHM_UNLOCK(r0, 0xc) 19:54:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x4800, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:57 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) [ 237.680750][T20558] ? fpregs_assert_state_consistent+0x7d/0x90 [ 237.686832][T20558] ? exit_to_user_mode_prepare+0x65/0x190 [ 237.692624][T20558] __x64_sys_clone3+0x2d/0x40 [ 237.697308][T20558] do_syscall_64+0x4a/0x90 [ 237.701853][T20558] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 237.709794][T20558] RIP: 0033:0x4665d9 [ 237.713680][T20558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 237.726700][T20576] SELinux: duplicate or incompatible mount options [ 237.733349][T20558] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 237.733373][T20558] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 237.733384][T20558] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 237.733395][T20558] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 237.772283][T20558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 19:54:57 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xa005, 0xac141409}}, 0x1c) [ 237.780296][T20558] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 237.814211][T20453] blk_update_request: I/O error, dev loop1, sector 264033 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 237.827448][T20509] blk_update_request: I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 237.839441][T20537] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 237.856017][T20537] loop1: detected capacity change from 0 to 264192 [ 237.863747][ T702] blk_update_request: I/O error, dev loop1, sector 264033 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 237.875178][ T702] Buffer I/O error on dev loop1p3, logical block 263808, async page read 19:54:57 executing program 1: syz_read_part_table(0x1800000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:54:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x4c00, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:57 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:54:57 executing program 3 (fault-call:3 fault-nth:56): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:57 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xc805, 0xac141409}}, 0x1c) [ 237.921717][T20537] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 19:54:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x6000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 237.990496][T20596] SELinux: duplicate or incompatible mount options [ 238.015010][T20604] FAULT_INJECTION: forcing a failure. [ 238.015010][T20604] name failslab, interval 1, probability 0, space 0, times 0 [ 238.027730][T20604] CPU: 1 PID: 20604 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 238.036552][T20604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.046613][T20604] Call Trace: [ 238.049898][T20604] dump_stack+0x137/0x19d [ 238.054240][T20604] should_fail+0x23c/0x250 [ 238.058659][T20604] ? anon_vma_clone+0x8d/0x380 [ 238.063419][T20604] __should_failslab+0x81/0x90 [ 238.068190][T20604] should_failslab+0x5/0x20 [ 238.072688][T20604] kmem_cache_alloc+0x46/0x2f0 [ 238.077457][T20604] anon_vma_clone+0x8d/0x380 [ 238.082047][T20604] anon_vma_fork+0x54/0x2b0 [ 238.086584][T20604] dup_mmap+0x49c/0x9c0 19:54:58 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xe803, 0xac141409}}, 0x1c) 19:54:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) r1 = shmget$private(0x0, 0x1000, 0x8, &(0x7f000001f000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1]}) shmat(r1, &(0x7f0000092000/0x9000)=nil, 0x5000) shmget$private(0x0, 0x3000, 0x1000, &(0x7f000024f000/0x3000)=nil) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(r2, &(0x7f0000ffc000/0x1000)=nil, 0x4000) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000dc0), 0x101000, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000e40)={'gre0\x00', &(0x7f0000000e00)={'tunl0\x00', 0x0, 0x7, 0x700, 0x7d, 0x3, {{0x8, 0x4, 0x0, 0x39, 0x20, 0x67, 0x0, 0xff, 0x2f, 0x0, @private=0xa010102, @empty, {[@generic={0x7, 0xc, "5df7d0b9a2f687e62866"}]}}}}}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@empty, 0x4e20, 0x0, 0x4e24, 0xfffa, 0x4, 0x20, 0x0, 0x0, r4, 0xffffffffffffffff}, {0x8, 0x3de5, 0xd1a4, 0x2, 0xfffffffffffffffe, 0x7, 0x3, 0x40}, {0x1b, 0x10000, 0xf2, 0xfa6}, 0xfea5, 0x6e6bb4, 0x2, 0x1, 0x1, 0x1}, {{@in=@multicast1, 0x4d3, 0xff}, 0xa, @in6=@remote, 0x3500, 0x2, 0x0, 0x2, 0x1, 0x5, 0x40}}, 0xe8) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f00003bc000/0x4000)=nil, 0x0) shmctl$SHM_UNLOCK(r0, 0xc) 19:54:58 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:54:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x6800, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 238.090813][T20604] dup_mm+0x7c/0x210 [ 238.094845][T20604] copy_process+0x1203/0x2e00 [ 238.099527][T20604] kernel_clone+0x14b/0x680 [ 238.104092][T20604] __se_sys_clone3+0x194/0x1d0 [ 238.108882][T20604] ? ksys_write+0x148/0x180 [ 238.113421][T20604] ? fpregs_assert_state_consistent+0x7d/0x90 [ 238.119553][T20604] ? exit_to_user_mode_prepare+0x65/0x190 [ 238.125282][T20604] __x64_sys_clone3+0x2d/0x40 [ 238.129958][T20604] do_syscall_64+0x4a/0x90 [ 238.134412][T20604] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 238.140337][T20604] RIP: 0033:0x4665d9 [ 238.144303][T20604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 238.157069][T20602] loop1: detected capacity change from 0 to 264192 [ 238.164126][T20604] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 238.179159][T20604] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 19:54:58 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xf401, 0xac141409}}, 0x1c) 19:54:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x6c00, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 238.187276][T20604] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 238.195241][T20604] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 238.203209][T20604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 238.211186][T20604] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 238.252382][T20602] loop1: p1[EZD] p3 [ 238.270992][T20602] loop1: p1 size 11290111 extends beyond EOD, truncated [ 238.299422][T20602] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:54:58 executing program 1: syz_read_part_table(0x1c00000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:54:58 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:54:58 executing program 3 (fault-call:3 fault-nth:57): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:58 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfc00, 0xac141409}}, 0x1c) 19:54:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x7400, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:58 executing program 4: socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:54:58 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfe80, 0xac141409}}, 0x1c) [ 238.440197][T20660] FAULT_INJECTION: forcing a failure. [ 238.440197][T20660] name failslab, interval 1, probability 0, space 0, times 0 [ 238.443393][T20663] loop1: detected capacity change from 0 to 264192 [ 238.453276][T20660] CPU: 1 PID: 20660 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 238.468576][T20660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.478627][T20660] Call Trace: [ 238.481922][T20660] dump_stack+0x137/0x19d [ 238.486252][T20660] should_fail+0x23c/0x250 [ 238.490705][T20660] ? anon_vma_clone+0x8d/0x380 [ 238.495479][T20660] __should_failslab+0x81/0x90 [ 238.500268][T20660] should_failslab+0x5/0x20 [ 238.504767][T20660] kmem_cache_alloc+0x46/0x2f0 [ 238.509534][T20660] anon_vma_clone+0x8d/0x380 [ 238.514194][T20660] anon_vma_fork+0x54/0x2b0 [ 238.518852][T20660] dup_mmap+0x49c/0x9c0 [ 238.523010][T20660] dup_mm+0x7c/0x210 [ 238.526916][T20660] copy_process+0x1203/0x2e00 [ 238.531588][T20660] kernel_clone+0x14b/0x680 [ 238.536126][T20660] __se_sys_clone3+0x194/0x1d0 [ 238.541074][T20660] ? ksys_write+0x148/0x180 [ 238.545609][T20660] ? fpregs_assert_state_consistent+0x7d/0x90 [ 238.551685][T20660] ? exit_to_user_mode_prepare+0x65/0x190 [ 238.557397][T20660] __x64_sys_clone3+0x2d/0x40 [ 238.562073][T20660] do_syscall_64+0x4a/0x90 [ 238.566573][T20660] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 238.572549][T20660] RIP: 0033:0x4665d9 [ 238.576510][T20660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 238.596124][T20660] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 238.604541][T20660] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 238.612517][T20660] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 238.620487][T20660] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 238.628457][T20660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 19:54:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x800, 0x0, 0x3, 0x9, 0x100}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0xffffffc1, 0x4) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000002e40)=[{{&(0x7f0000000100)=@l2tp6={0xa, 0x500, 0x0, @remote}, 0x80, 0x0}}, {{&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x80000, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001980)=ANY=[], 0x1260}}], 0x2, 0x0) 19:54:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x7a00, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:58 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xff00, 0xac141409}}, 0x1c) 19:54:58 executing program 3 (fault-call:3 fault-nth:58): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:58 executing program 4: socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) [ 238.636421][T20660] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 238.651997][T20663] loop1: p1[EZD] p3 [ 238.680931][T20663] loop1: p1 size 11290111 extends beyond EOD, truncated [ 238.716767][T20683] FAULT_INJECTION: forcing a failure. [ 238.716767][T20683] name failslab, interval 1, probability 0, space 0, times 0 [ 238.729449][T20683] CPU: 0 PID: 20683 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 238.738305][T20683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.748353][T20683] Call Trace: [ 238.751626][T20683] dump_stack+0x137/0x19d [ 238.755966][T20683] should_fail+0x23c/0x250 [ 238.760378][T20683] ? anon_vma_clone+0x8d/0x380 [ 238.765137][T20683] __should_failslab+0x81/0x90 [ 238.769900][T20683] should_failslab+0x5/0x20 [ 238.774388][T20683] kmem_cache_alloc+0x46/0x2f0 [ 238.779235][T20683] anon_vma_clone+0x8d/0x380 [ 238.783939][T20683] anon_vma_fork+0x54/0x2b0 [ 238.788514][T20683] dup_mmap+0x49c/0x9c0 [ 238.792667][T20683] dup_mm+0x7c/0x210 [ 238.796542][T20683] copy_process+0x1203/0x2e00 [ 238.801195][T20683] kernel_clone+0x14b/0x680 [ 238.805687][T20683] __se_sys_clone3+0x194/0x1d0 [ 238.810442][T20683] ? ksys_write+0x148/0x180 [ 238.814923][T20683] ? fpregs_assert_state_consistent+0x7d/0x90 [ 238.820973][T20683] ? exit_to_user_mode_prepare+0x65/0x190 [ 238.826675][T20683] __x64_sys_clone3+0x2d/0x40 [ 238.831331][T20683] do_syscall_64+0x4a/0x90 [ 238.835729][T20683] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 238.841690][T20683] RIP: 0033:0x4665d9 [ 238.845564][T20683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 238.865151][T20683] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 238.873643][T20683] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 238.881640][T20683] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 238.889620][T20683] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 238.897579][T20683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 238.905573][T20683] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 238.914461][T20663] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:54:58 executing program 1: syz_read_part_table(0x2600000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:54:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xedc0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:58 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x20480, 0xac141409}}, 0x1c) 19:54:58 executing program 3 (fault-call:3 fault-nth:59): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:58 executing program 4: socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:54:58 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000080)="7174c71bcc67683df9b08c14a3f939a3cc6757b9d19b791667ae10092dd5baa177cd12925b6ed9694482279f0ce41460c3e08147a00d4e0230", 0x39}], 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setopts(0x4200, r0, 0x2b90, 0x5a) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 238.958657][ T1033] loop1: p1[EZD] p3 [ 238.964914][ T1033] loop1: p1 size 11290111 extends beyond EOD, truncated [ 238.981626][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 239.020587][T20708] FAULT_INJECTION: forcing a failure. [ 239.020587][T20708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 239.033845][T20708] CPU: 1 PID: 20708 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 239.042598][T20708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.052661][T20708] Call Trace: [ 239.055940][T20708] dump_stack+0x137/0x19d [ 239.060454][T20708] should_fail+0x23c/0x250 [ 239.064966][T20708] __alloc_pages+0x102/0x320 [ 239.069557][T20708] alloc_pages+0x21d/0x310 [ 239.073985][T20708] pte_alloc_one+0x29/0xb0 [ 239.078395][T20708] __pte_alloc+0x2f/0x210 [ 239.082723][T20708] copy_pte_range+0x128e/0x1460 [ 239.087574][T20708] ? __alloc_pages+0x194/0x320 [ 239.092330][T20708] ? vma_interval_tree_augment_rotate+0x100/0x100 [ 239.098740][T20708] copy_page_range+0x5da/0x8e0 [ 239.103510][T20708] ? anon_vma_fork+0x273/0x2b0 [ 239.108276][T20708] dup_mmap+0x6ab/0x9c0 [ 239.112431][T20708] dup_mm+0x7c/0x210 [ 239.116322][T20708] copy_process+0x1203/0x2e00 19:54:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xe0ffff, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 239.121002][T20708] kernel_clone+0x14b/0x680 [ 239.125499][T20708] __se_sys_clone3+0x194/0x1d0 [ 239.130267][T20708] ? ksys_write+0x148/0x180 [ 239.134770][T20708] ? fpregs_assert_state_consistent+0x7d/0x90 [ 239.140843][T20708] ? exit_to_user_mode_prepare+0x65/0x190 [ 239.146570][T20708] __x64_sys_clone3+0x2d/0x40 [ 239.151245][T20708] do_syscall_64+0x4a/0x90 [ 239.155673][T20708] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 239.161590][T20708] RIP: 0033:0x4665d9 [ 239.165509][T20708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 239.166867][T20729] loop1: detected capacity change from 0 to 264192 [ 239.185196][T20708] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 239.185220][T20708] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 239.185232][T20708] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 19:54:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x1000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) [ 239.185242][T20708] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 239.185251][T20708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 239.232106][T20708] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:54:59 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x34000, 0xac141409}}, 0x1c) 19:54:59 executing program 3 (fault-call:3 fault-nth:60): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 239.267137][T20729] loop1: p1[EZD] p3 [ 239.271555][T20729] loop1: p1 size 11290111 extends beyond EOD, truncated [ 239.295992][T20742] SELinux: duplicate or incompatible mount options 19:54:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) [ 239.316498][T20729] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:54:59 executing program 1: syz_read_part_table(0x3105000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:54:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/185, 0xb9}], 0x1, 0xd9f, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) mmap(&(0x7f000019e000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0xe958f000) creat(&(0x7f0000000340)='./file0\x00', 0x123) 19:54:59 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x40000, 0xac141409}}, 0x1c) 19:54:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x2000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 239.397803][T20761] FAULT_INJECTION: forcing a failure. [ 239.397803][T20761] name failslab, interval 1, probability 0, space 0, times 0 [ 239.410448][T20761] CPU: 1 PID: 20761 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 239.419241][T20761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.429296][T20761] Call Trace: [ 239.432660][T20761] dump_stack+0x137/0x19d [ 239.436996][T20761] should_fail+0x23c/0x250 [ 239.441410][T20761] ? dup_mmap+0x38e/0x9c0 19:54:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x3000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 239.445731][T20761] __should_failslab+0x81/0x90 [ 239.450498][T20761] should_failslab+0x5/0x20 [ 239.453181][T20772] SELinux: duplicate or incompatible mount options [ 239.454998][T20761] kmem_cache_alloc+0x46/0x2f0 [ 239.466323][T20761] ? anon_vma_fork+0x273/0x2b0 [ 239.471157][T20761] dup_mmap+0x38e/0x9c0 [ 239.475315][T20761] dup_mm+0x7c/0x210 [ 239.479275][T20761] copy_process+0x1203/0x2e00 [ 239.483949][T20761] kernel_clone+0x14b/0x680 [ 239.488451][T20761] __se_sys_clone3+0x194/0x1d0 19:54:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x4000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:54:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) [ 239.488915][T20775] SELinux: duplicate or incompatible mount options [ 239.493211][T20761] ? ksys_write+0x148/0x180 [ 239.493230][T20761] ? fpregs_assert_state_consistent+0x7d/0x90 [ 239.493280][T20761] ? exit_to_user_mode_prepare+0x65/0x190 [ 239.516169][T20761] __x64_sys_clone3+0x2d/0x40 [ 239.520922][T20761] do_syscall_64+0x4a/0x90 [ 239.525351][T20761] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 239.531252][T20761] RIP: 0033:0x4665d9 19:54:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x5000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 239.535281][T20761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 239.554888][T20761] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 239.561685][T20783] SELinux: duplicate or incompatible mount options [ 239.563291][T20761] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 239.563306][T20761] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 239.585858][T20761] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 19:54:59 executing program 3 (fault-call:3 fault-nth:61): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:54:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x0, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) [ 239.593866][T20761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 239.601832][T20761] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 239.605621][T20786] SELinux: duplicate or incompatible mount options 19:54:59 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x100000, 0xac141409}}, 0x1c) 19:54:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x6000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 239.658713][T20771] loop2: detected capacity change from 0 to 512 [ 239.675106][T20799] loop1: detected capacity change from 0 to 264192 [ 239.708365][T20808] FAULT_INJECTION: forcing a failure. [ 239.708365][T20808] name failslab, interval 1, probability 0, space 0, times 0 [ 239.721233][T20808] CPU: 1 PID: 20808 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 239.723297][T20814] SELinux: duplicate or incompatible mount options [ 239.729987][T20808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.746667][T20808] Call Trace: [ 239.749944][T20808] dump_stack+0x137/0x19d [ 239.750643][ T1033] loop1: p1[EZD] p3 [ 239.754344][T20808] should_fail+0x23c/0x250 [ 239.754364][T20808] ? dup_mmap+0x38e/0x9c0 [ 239.754378][T20808] __should_failslab+0x81/0x90 [ 239.754416][T20808] should_failslab+0x5/0x20 [ 239.758705][ T1033] loop1: p1 size 11290111 extends beyond EOD, [ 239.762679][T20808] kmem_cache_alloc+0x46/0x2f0 [ 239.766996][ T1033] truncated [ 239.772096][ T1033] loop1: p3 size 1912633224 extends beyond EOD, [ 239.776211][T20808] ? anon_vma_fork+0x273/0x2b0 [ 239.776235][T20808] dup_mmap+0x38e/0x9c0 [ 239.776252][T20808] dup_mm+0x7c/0x210 [ 239.782410][ T1033] truncated [ 239.787131][T20808] copy_process+0x1203/0x2e00 [ 239.817088][T20808] kernel_clone+0x14b/0x680 [ 239.821600][T20808] __se_sys_clone3+0x194/0x1d0 [ 239.826347][T20808] ? ksys_write+0x148/0x180 [ 239.830827][T20808] ? fpregs_assert_state_consistent+0x7d/0x90 [ 239.836893][T20808] ? exit_to_user_mode_prepare+0x65/0x190 [ 239.842595][T20808] __x64_sys_clone3+0x2d/0x40 [ 239.847267][T20808] do_syscall_64+0x4a/0x90 [ 239.851665][T20808] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 239.857549][T20808] RIP: 0033:0x4665d9 [ 239.861420][T20808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 239.881009][T20808] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 239.889401][T20808] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 239.897428][T20808] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 239.905381][T20808] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 239.913410][T20808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 239.921360][T20808] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 239.936255][T20799] loop1: p1[EZD] p3 [ 239.940485][T20799] loop1: p1 size 11290111 extends beyond EOD, truncated [ 239.943669][T20771] loop2: detected capacity change from 0 to 512 [ 239.954991][T20799] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 239.968670][T20771] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 239.997048][T20799] loop1: detected capacity change from 0 to 264192 [ 240.024418][T20799] loop1: p1[EZD] p3 [ 240.028519][T20799] loop1: p1 size 11290111 extends beyond EOD, truncated [ 240.042964][T20799] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:00 executing program 1: syz_read_part_table(0x3f00000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:00 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x0, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x7000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:00 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x400300, 0xac141409}}, 0x1c) 19:55:00 executing program 3 (fault-call:3 fault-nth:62): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:00 executing program 2: ptrace$setregset(0x4205, 0xffffffffffffffff, 0x2, &(0x7f0000000100)={&(0x7f0000000000)="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", 0xfa}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) pwritev(r0, &(0x7f00000017c0)=[{&(0x7f0000000280)="2b0d98a23346813bf534240e704efe8c52ab6e36dde1a0c43343e684a45f7067904b0491fe6d67f678cc68ac71d5bda928d0a31503db001ba6fed51b1ca74445dbb27dffa403081f7ca73661821ced71013fda5f4ad6df7a5eeaacc364bf32ac271700fc1cdb3e4e5327a2fb36bbe887a15ae07a54f75ad705ef83406b40905f7f28c19dcce77c15e93483c1e30a94d755b6ce392c78952661cc28eaf20fb7f7ce144258d3", 0xa5}, {&(0x7f00000003c0)="283bb3e94ec2a8b45673d439dec6cbbbdf614ce977470737e25d2209dc96b7b1d5881d85d1a188a5525fab0f17590b81203ea3508da489ec977e45e84b9e66fc351fe9d54e66d87800e4ab7fb4c4177e14140b3f230508e4b1c02c62108318027c5716e383", 0x65}, {&(0x7f0000000440)="a004578c0bc1a282ff21f443b15c1d3fc4d2d949a43063c574d169b8d588183d0f0a7873a0cdb11460e814f74aa9834828352026f8f5a84dd901a347e317ce07052edd899ec24097f226b297dd8d6f03cd4364811831ee5caea5f8b0f8fd12920c6138687c225df37ead480708eb0389b430a4e3a4fb01b91700618099a0b856f0c83d68ae071e41160af69a2c55564df6bcc1956b82689d4223dc7aeb02a636cf53a4e51859cb982d9a404d6e99dee0a5a1b7535a364270bd2a", 0xba}, {&(0x7f0000000500)="65d496f9dd6413eecf56c26b54f456dc6c16846f1811800a72d9d23662adc97cb840ac1948b8046504ac15682313f2c749af9aefb3a458138c3aea9f8085145248949e73544a975983666f72084b1bc17a8e0796e7b573b1ec5d011be7348abe153de7942084fd17e7cdebd9b3a5e03002c5395a2ba54a4831bfb98f90e320aff1396b32e4084714662bafd35dcc12bc6ebcf9159ed010d01ffe36cc173523e6db19c2ae3c794263b8f5219f94299d0f6965a3de10f237d5e418d5c0e75abadcc5952c5a5745a8bfa417a8", 0xcb}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="93e4c27be11cb13e51d51bb5e8d1882b17294948de1f7bd37d116e23b37751ef477cb295dcdfe822c89148d15e5f075c5c6f5eced7e7c1387ad1c1d07f9ed27c2d5afb582f20483fc3d9decad9f4840b1ed6e45b5a663cdd17022d66fa21b61a97bca5aca72fe8289a0a2a932a288cef81884a9a6b19d49b399bd1b9cbe6806a3e590c00e5944f8b53fe564d4a6739", 0x8f}, {&(0x7f00000001c0)="df0e0d8c1d5caab9f96142cd2cce15e7ada551810d6ff42837928431535ed0fc1040d844bed9f0fc", 0x28}, {&(0x7f00000016c0)="6a9c5fe5a0703f0680ffedf73fe511978d18c9d0b785b1ecc19945f1ac8f2d96f367aecf12223b67ac2b110e876f2afb46244e3cd72fff3f041027766fc07fc5c41d940aff66bb8005d5c44293864b38be5c64d26cf10db0e73b7fec784c4b9d663c764625779e32bdf8d1493e7aa338809dad978ea5f45727950175c52ff022ba0a0584b5fe670a0bd7c419a54575f701c037d2528d9ad1f710df78f435b0517fb11c868819b57acdd7341bda1ad1ca8a187997a9453ae1d4f03d798d767173f9ce40697de7a12d4fb4318bb7a30b16a59831d242739e59249a8c7ec3ad5de9d088f1", 0xe3}], 0x8, 0x40, 0x10001) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x7a05, 0x1700) openat$cgroup_ro(r1, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000140), 0x9, 0x2000) write$cgroup_int(r2, &(0x7f0000000200), 0x12) [ 240.071741][ T1033] loop1: p1[EZD] p3 [ 240.075811][ T1033] loop1: p1 size 11290111 extends beyond EOD, truncated [ 240.091275][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:00 executing program 2: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x800002, &(0x7f0000000180)=ANY=[@ANYBLOB="1459dd0cb0152e9c0d868fe5263647304b9883d7b29431cd024b8eaa8ab266a76dee8d36a222bd3ef292fde5fdbe0feb6955fde51c4a6664549b707e85998221c328800f0d6b57a2d97ec94f19534cd78973f2eded5d68bd577752147ce8859b5edc81f695950445ca621e8082abd2f8b6a5b9826e711a42902e7b23fb8b3c53797f931b08e48691531c94ce6eb7833561b593a91e81d9aac946cfd1f8d4f5a154468afecd481c7960f5493e211acaf6b9cfc25fd5d07a562bb0c84cbf88ef872ea2bfa2645d665c8e86516edba6c7c65efa"]) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) faccessat(r1, &(0x7f0000000080)='./file0\x00', 0x118) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2d) [ 240.124701][T20856] FAULT_INJECTION: forcing a failure. [ 240.124701][T20856] name failslab, interval 1, probability 0, space 0, times 0 [ 240.129480][T20860] SELinux: duplicate or incompatible mount options [ 240.137367][T20856] CPU: 0 PID: 20856 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 240.152686][T20856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.162803][T20856] Call Trace: [ 240.166086][T20856] dump_stack+0x137/0x19d [ 240.170427][T20856] should_fail+0x23c/0x250 19:55:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x8000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 240.174945][T20856] ? anon_vma_clone+0x8d/0x380 [ 240.179744][T20856] __should_failslab+0x81/0x90 [ 240.184532][T20856] should_failslab+0x5/0x20 [ 240.189032][T20856] kmem_cache_alloc+0x46/0x2f0 [ 240.194043][T20856] ? avc_has_perm_noaudit+0x19a/0x240 [ 240.199508][T20856] anon_vma_clone+0x8d/0x380 [ 240.204142][T20856] anon_vma_fork+0x54/0x2b0 [ 240.208653][T20856] dup_mmap+0x49c/0x9c0 [ 240.212820][T20856] dup_mm+0x7c/0x210 [ 240.214418][T20873] SELinux: duplicate or incompatible mount options 19:55:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x9000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 240.216718][T20856] copy_process+0x1203/0x2e00 [ 240.216741][T20856] kernel_clone+0x14b/0x680 [ 240.232462][T20856] __se_sys_clone3+0x194/0x1d0 [ 240.237266][T20856] ? ksys_write+0x148/0x180 [ 240.241767][T20856] ? fpregs_assert_state_consistent+0x7d/0x90 [ 240.247914][T20856] ? exit_to_user_mode_prepare+0x65/0x190 [ 240.253639][T20856] __x64_sys_clone3+0x2d/0x40 [ 240.258396][T20856] do_syscall_64+0x4a/0x90 [ 240.260081][T20877] SELinux: duplicate or incompatible mount options [ 240.262812][T20856] entry_SYSCALL_64_after_hwframe+0x44/0xae 19:55:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xa000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 240.262840][T20856] RIP: 0033:0x4665d9 [ 240.262853][T20856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 240.298886][T20856] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 240.305728][T20881] SELinux: duplicate or incompatible mount options [ 240.307294][T20856] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 19:55:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xb000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 240.307310][T20856] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 240.330274][T20856] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 240.338295][T20856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 240.346265][T20856] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 240.348286][T20884] SELinux: duplicate or incompatible mount options 19:55:00 executing program 3 (fault-call:3 fault-nth:63): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 240.376749][T20858] loop1: detected capacity change from 0 to 264192 [ 240.424517][T20858] loop1: p1[EZD] p3 [ 240.438420][T20858] loop1: p1 size 11290111 extends beyond EOD, truncated [ 240.448301][T20858] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 240.455072][T20904] FAULT_INJECTION: forcing a failure. [ 240.455072][T20904] name failslab, interval 1, probability 0, space 0, times 0 [ 240.468153][T20904] CPU: 0 PID: 20904 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 240.476961][T20904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.487015][T20904] Call Trace: [ 240.490281][T20904] dump_stack+0x137/0x19d [ 240.494597][T20904] should_fail+0x23c/0x250 [ 240.499077][T20904] ? anon_vma_fork+0xb1/0x2b0 [ 240.503735][T20904] __should_failslab+0x81/0x90 [ 240.508510][T20904] should_failslab+0x5/0x20 [ 240.512991][T20904] kmem_cache_alloc+0x46/0x2f0 [ 240.517734][T20904] anon_vma_fork+0xb1/0x2b0 [ 240.522698][T20904] dup_mmap+0x49c/0x9c0 [ 240.526833][T20904] dup_mm+0x7c/0x210 [ 240.530709][T20904] copy_process+0x1203/0x2e00 [ 240.535365][T20904] kernel_clone+0x14b/0x680 [ 240.539994][T20904] __se_sys_clone3+0x194/0x1d0 [ 240.544734][T20904] ? ksys_write+0x148/0x180 [ 240.549230][T20904] ? fpregs_assert_state_consistent+0x7d/0x90 [ 240.555335][T20904] ? exit_to_user_mode_prepare+0x65/0x190 [ 240.561051][T20904] __x64_sys_clone3+0x2d/0x40 [ 240.565718][T20904] do_syscall_64+0x4a/0x90 [ 240.570116][T20904] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 240.575996][T20904] RIP: 0033:0x4665d9 [ 240.579869][T20904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 240.599475][T20904] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 240.607916][T20904] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 240.615866][T20904] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 19:55:00 executing program 1: syz_read_part_table(0x4000000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:00 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xf0ff7f, 0xac141409}}, 0x1c) 19:55:00 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x0, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xc000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 240.623920][T20904] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 240.631870][T20904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 240.639865][T20904] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:55:00 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:00 executing program 2: r0 = socket(0x840000000002, 0x3, 0xff) sendmmsg$inet(r0, &(0x7f0000004900)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="ab705f0044b3e67ad8ea3d4900000000000000", 0x13}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000000180)="aaf6006b829bac3903eeb86f495ec50d36a5bd349cb99793", 0x18}], 0x3}}], 0x1, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000300), 0x204080, 0x0) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000000700)=[{{&(0x7f0000000340)=@nfc_llcp, 0x80, &(0x7f0000000680)=[{&(0x7f00000003c0)=""/30, 0x1e}, {&(0x7f0000000400)=""/36, 0x24}, {&(0x7f0000000440)=""/71, 0x47}, {&(0x7f00000004c0)=""/107, 0x6b}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000640)=""/35, 0x23}], 0x6}, 0x7}], 0x1, 0x41, &(0x7f0000000780)={r3, r4+10000000}) sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x100}}, 0x20000010) 19:55:00 executing program 3 (fault-call:3 fault-nth:64): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 240.693421][T20921] loop1: detected capacity change from 0 to 264192 [ 240.702279][T20915] SELinux: duplicate or incompatible mount options [ 240.730677][T20921] loop1: p1[EZD] p3 [ 240.734918][T20921] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:00 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x1000000, 0xac141409}}, 0x1c) 19:55:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xd000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 240.778992][T20921] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 240.811372][T20939] FAULT_INJECTION: forcing a failure. [ 240.811372][T20939] name failslab, interval 1, probability 0, space 0, times 0 19:55:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000100)=@ethtool_per_queue_op={0x4b, 0x18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}) [ 240.824024][T20939] CPU: 0 PID: 20939 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 240.832856][T20939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.835451][T20947] SELinux: duplicate or incompatible mount options [ 240.842903][T20939] Call Trace: [ 240.842913][T20939] dump_stack+0x137/0x19d [ 240.842938][T20939] should_fail+0x23c/0x250 [ 240.842956][T20939] ? anon_vma_fork+0x117/0x2b0 [ 240.866373][T20939] __should_failslab+0x81/0x90 [ 240.871146][T20939] should_failslab+0x5/0x20 19:55:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xe000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 240.875649][T20939] kmem_cache_alloc+0x46/0x2f0 [ 240.880419][T20939] ? anon_vma_fork+0xb1/0x2b0 [ 240.885145][T20939] anon_vma_fork+0x117/0x2b0 [ 240.889746][T20939] dup_mmap+0x49c/0x9c0 [ 240.893897][T20939] dup_mm+0x7c/0x210 [ 240.897780][T20939] copy_process+0x1203/0x2e00 [ 240.899284][T20954] SELinux: duplicate or incompatible mount options [ 240.902456][T20939] kernel_clone+0x14b/0x680 [ 240.902473][T20939] __se_sys_clone3+0x194/0x1d0 [ 240.902492][T20939] ? ksys_write+0x148/0x180 [ 240.902506][T20939] ? fpregs_assert_state_consistent+0x7d/0x90 19:55:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x10000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 240.928829][T20939] ? exit_to_user_mode_prepare+0x65/0x190 [ 240.934558][T20939] __x64_sys_clone3+0x2d/0x40 [ 240.939327][T20939] do_syscall_64+0x4a/0x90 [ 240.943812][T20939] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 240.949796][T20939] RIP: 0033:0x4665d9 [ 240.953686][T20939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 240.973371][T20939] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 240.981791][T20939] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 240.990048][T20939] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 240.992384][T20960] SELinux: duplicate or incompatible mount options [ 240.998073][T20939] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 240.998089][T20939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 240.998101][T20939] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 241.041758][T20509] blk_update_request: I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 241.055126][T20749] blk_update_request: I/O error, dev loop1, sector 264033 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 241.058283][T20921] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 241.067677][ T702] blk_update_request: I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 241.085324][ T702] Buffer I/O error on dev loop1p1, logical block 33008, async page read [ 241.093787][ T702] blk_update_request: I/O error, dev loop1, sector 264033 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 241.105096][ T702] Buffer I/O error on dev loop1p3, logical block 263808, async page read [ 241.113546][ T702] blk_update_request: I/O error, dev loop1, sector 264034 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 241.125193][ T702] Buffer I/O error on dev loop1p3, logical block 263809, async page read [ 241.133645][ T702] blk_update_request: I/O error, dev loop1, sector 264035 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 241.135302][T20921] loop1: detected capacity change from 0 to 264192 [ 241.145084][ T702] Buffer I/O error on dev loop1p3, logical block 263810, async page read 19:55:01 executing program 1: syz_read_part_table(0x4000080000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:01 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0/bus\x00', 0x180) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x6, &(0x7f0000027000)={0x1}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x2c}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f000000b100)=[{{0x0, 0x0, &(0x7f0000003e40)=[{&(0x7f0000002d40)="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", 0x1000}, {&(0x7f0000003d40)="ff4199f1f21f711a007f8591516d5f6f5db331e80c2687671b7064f447a0ddce7158fc7659dea6781e5bbe75bd994844fd07c0d07578f4d31a5c0ef8b493962d0fcee8748d18de128a460fb2b60e38c69a70316f8550ea5c8c2a7c70da4a3f819102b74c6b23bbad99e4b47b2511f293dee12db705585a10514782a2a428ec3961e43fc81b3e855f17428b34e6cfd6344f914346687f101f132d92c59e761d984778c0e455c620dea1f44b61046aebe50906", 0xb2}, {&(0x7f0000003e00)="6ba1d5b882716a0c3b89624055b80ff4cf021c0dd996793d0c8f772096476793e13477d3162f76c6bd", 0x29}], 0x3}}, {{&(0x7f0000003e80)=@tipc=@nameseq={0x1e, 0x1, 0x1, {0x1, 0x3, 0x2}}, 0x80, &(0x7f0000005480)=[{&(0x7f0000003f00)="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", 0x1000}, {&(0x7f0000004f00)="2e39a93cd021bd1c051e4a843ee597afbe51847ecaf145dfd82327cb76d7973d", 0x20}, {&(0x7f0000004f40)="96dec629534f9bbf7d7ae6467be2243a0f2da2ebd46912c5533c7666f28b39902663a1cf83ee1e366efea4e96d48097987c83a95c31615eb90e9507dbbdca79993a939c620ce36ae16c45eee45112c708ccc0fb8074f464cd7de56563dc8b777fcfef65170141be91e5c147ff6a2f1ac3d831d810c3d8e4709e12fda2432ab4f637516460603c7088c1369d0c438d2c11bdce5957a3161cd0cca3681a0", 0x9d}, {&(0x7f0000005000)="dc879dd4b7c31c9983c8d6b8", 0xc}, {&(0x7f0000005040)="0b86048e75544a4aa2b968e64dbbb925f0b3d305e170a3ec5a5324b8df854fc7926e2adf286ef623a19dd010635a5c6aff1ea0c247f52d5828f6db2b73c02f90797c8a490be94d47a9d97c712de88ad3c1c2173f2f0e1230dd573d6519f944df385096c7ec4dd5da8d8c92e24e45b7fb679d1be51eff91346834fdb4bcf6a0", 0x7f}, {&(0x7f00000050c0)="763b19e53882df8b4532d7fc8648efce112a70a172f8dcf3debf08fbef61dc2d6dc042efbe3483e6f72c2b6f5d909c41a8243f68d51aa70171977ff3dd04af7cdd69fc82ba46b52dbe1407629a04039f0eb8b952d4caf28730928b7bd33bdec2dbf0e4465e56fa2b69664186ec68078d36a0d6bc3ba5b454fb52b932e415a4155a9d6955f13924733d4acf8e296eb5cf8a191272b7478284c101830932ddc4f4b305660695f9665ba7b1129c139a58f21e2eea13055b99bdee2d2c3154f0bcf2fe6d806bb0bec6f6e8319f5836127becace4e6e404977fc6d713", 0xda}, {&(0x7f00000051c0)="6afda84b6060ce5f1fe52975b6a61b7b2a7ccfcab75f13ef31b7e7c1a84a11be5cbd8e2b2b33898ee7103811bbd5eb304aaa28fb34581e0483061e71dde1964e0ac7babf560a49c599c453ca75fd64648df8baf49713928a7eb1fdcc3da80d94989fc9e494f9a97a9b6de478d8890a2c6d2b121eacedeba1f1b5b4d2a7814f6b138bcbd9a47cd068c05bdbd7ad4e68236dce87fca211b37c0c6cbe8957ac53b35df4d49cefa82503887d93aa518f81ea5c11a20cac0d7e70db588188bc407180d5ab38ec0b264f01ff5164b39c25b6b48140390bfa0c6acd9e867ac578764a6ed4b634d7b4a91c74d268", 0xea}, {&(0x7f00000052c0)="cd4f7360cc448fd32444884a428fcda01ac2d74298807b2238302fa650e7ac24cf37f8da1ed0ae2dd103bab97209e2543bf5e30e98a6aef225553691cf87f72402a67bbd7a5e50732060e2b6deec63857c047ba9c63572071da565ad5c838f9fc56c6910cddefaef651c7aa2f102b8e4", 0x70}, {&(0x7f0000005340)="9cde8f82e0e5e86c180a43e01a836008fb36baaf02938bdee3cf6b9935ce29798548a24e3792256d807dfae7a9a408985be19df64a45efc844b33a9be0a93dcaff9b3c", 0x43}, {&(0x7f00000053c0)="d0e7fff263ebb4c70ae34f9f9cf8dc577d40aa89ef2a2a456c8699d8ef0c092ec8c4250816958f1eda768475baf1a65efb1af38781f73f17f9f193441c2af0406ac0c8c9efe007fe63b27662edd5ad70e4c2292763b6ada3b264177627e1f928167dacbd7fd99d2f43308d11239a8d94f077b12b12e9302d0115bccfd2d6143366fd211519bbf4f14f903b00b6d599062a", 0x91}], 0xa}}, {{&(0x7f0000005540)=@qipcrtr={0x2a, 0x0, 0xffffffff}, 0x80, &(0x7f00000057c0)=[{&(0x7f00000055c0)="58eb213de57333970d72b0d666b8193e5abdc43c5fcc66b85fff", 0x1a}, {&(0x7f0000005600)="6ca846e1f4d41a23ffcbeb2a2b41bcc68961e6e38c2173ef1be1276e20ff7424ad44d6a65696a9749feed7c840f2136016a1f400940a898d987eaf98440dcbc2ba8fd45bd11c4e99fdbea193c25ba283188331f286d219ae8f02c7b33472dab2acf69bf9f4cfb97adadbbd17df8aee014f4f5e6e76c6bb75cf5f2e45a73a66c01a40be3ba4bd762d8752478c5ab2c0a74affdc7ed3736d3fbcd2b5452f8d0e76ba82d3ef7798f1d52e463c1a0fb019dcc5fe2fc0dd95f0c916deaf0ee6e28355", 0xc0}, {&(0x7f00000056c0)="e37f0104849bdb91323f60244670d76b7eb57bfd1933432d8273c9b7647c404cf015671b62387b6737c5b5f5b077119553881ac88ecd205866456a8af5376647105e787eae69afbbf454e2f904661a9b6b372a66e9abf6f0eed1a7ff3624dad506436ed851db7f66a3739ca83a591f4bf44cbc4406f72e8d9d34aa02e13e1090591d0ead7a8f50621fda88aaa9513d70b9443e3458dcded925f4ca56d93dc886c47d65b6e819283796ddaef72255fa2e2e1f62503675c184622078e6d09f469aa45d3f0b6eb06a3fd883713a", 0xcc}], 0x3, &(0x7f0000005800)=[{0xa8, 0x10a, 0x0, "3e015f4443dc34fb131ef72fe6fcfbb2b626e766c68c02b73cbefaecc3d55af585348f96b7a48dbbf888774a0e1ec607d875c77120cb0c4d3fc9cd747be29095f2d686334585db6378a4247deaf1d034d8e02e8b5e3975069314d9e11118977bf54207d3119f2a4400ccf4a0b65186675a275ac70e7b7b765c9994c825a3ad43e41efabb3bb3a296e8fab5a7601a464468dfb0aff0ac"}, {0xa8, 0x119, 0x84, "3fae7478371689a2b8398e3cff4e0b11bafa7d6a4e1e596e7ae148b0610a46481652971e648e5f623324c8080567b091e03b23ab13e6f055d2c94197579551d2a5662ba185c5c8d6ef254d8ac55434d8fc7193472eafe6cca3ec5f0384e64e34f591d1be516d5925ba273206c96a39c11ae37535630714c1aef9f69a316e8d69d2de01c080d270b799d5aadbb5e5e38784def5"}, {0x80, 0x0, 0x80000001, "999007305c70c9c46d5020bb083d435599218510c3594fd0b861f6322f205e434f9bb15f4db10df869421f1d2c284794d1080502d17dc034c9e3d34fc43868eab01e3593f1fa7c7ae0346f5a57e30d672a8ed126ba691d93012ef9d5e28e0ffccd5bf0fce1c11cf3c54f017f3048"}, {0xf0, 0x108, 0x0, "176fd991f5826ad8004821428dc9c79d08d7299d3c0444044baf31ed03568ff4490d2a15b6d9ac66e7b6bb102aef81bf4130522fe50af43e8c2cc5b220ed420acecd1eb3ebbf6f5615160c02ec643c5c605cf44f7fde0c91f78532028a038fa1b202980158fa94c012ffe3693ab2c9befddbd7308d77df66afbecd0c30dfe223a62c5a5a0cfb2dccb427ca789a83595fe51dc21651d7373c6f96f3878067fc862cfec328ca9e7b45b4de646244bf6d6ec7e748f22ee2d7842ab5613d6204eeccf35505f57821ae7b2368c0aa908d7549ac14f1f116cc10deb2223e019f3e3a"}, {0x100, 0x6, 0x4, "5ed457021de1c2b87e18eaa51767f02b59b92a71e85530cda7611a16ac3d3b540e1cf16e0b011fd3b8252a175ddc9233c8579cbd03256031d0fccd4a80e962fe06eae48f9a3e8aaaf06e455bfb428b1697a667c5035298455a29d4733c95877e3aa03de93677e4c2085c5ab339ca8011109477510bbeaad742a4a4b08a2455a84a1d51671962f2d5d7caa106bfab25a14d238e7c21a31e90c61d6e8823c9b10b16ea6e92f5a7b812cb79e41f602f05c825ba12a6496a2603d27dc59a37266b320167b1d9edc122415431c9f134d73d6097549ac54cd42e1cc1dde2239c6f405708b721bd3474a565c8ffe1aa5e05"}, {0x1010, 0x119, 0x3, "838d45b7183aa96eba529b716902a7966810b88e2e416f05746e97b052ee9923aeb1480b035ab78cdcb807db7fe0bf72ecc58d425d410f445911ee6e2f40cb02a608ea6380488db0685b4897397e0595a12a53b058e814f0d02da54dad2e3fb8a3c551d46bf810e707938829e1f617e847d95a1d6c89d093cf7e683e3c158e539c9a51dc1d12cbc93352214118a8c68200dfe1a9f58e6f04d93821a7f60eabff00ec817bb22593db5c5e4e7dfee0e54ee2f603797c6255ddd1c90a5cd4ff7686317f64a38fb7441cd528a776e3a6cb82f821fda3a7c81ef16503f2b4698f7424d95589c486f5ea3d43018e4d8e0ad10af4f16b5a03021ffe2415e801a0571bd1c0230cdcd72ab95dcb7af8691e44e9016399df1cee55aa406241d3036eef2fa65991db570a73f64e69d6b3571dc0b6806ca1df2be288856ced191b0bc94cd31578e13daef0d965780403a17be378ecdff4971eb6735ffaafef69fb87d27fc75a46f21540863bd672c52730c32f6fe6bed18e6b683b5c2369a13105707e11c3bf4961ef065ba8dddfafc0ed73405be94679c7b1aeb9b0459320cf0f256679d9977fce296192578d76efbec8bbe580b89b6e45487dbe3e3c2a82c32451cf97263f78b76a3f0f04e08f7e0fb241d3b9c27ee38c329d6e0fc855b04d79b2358e7d0d279dd287c8fc71680eb66a0b165b644cef7b5c4870ab973861d17eaff0ac9b9828627a8e23b40e36e993a7dda9596ae74ba5426c0cdcf3df17dd2141d44547bb7f293416435a87aca7131bc0c4903184d723830f2e48d38ea2049bff2b4cdd775e4fc57b9a22df8d240fd750806eb29c15598c9cb426da67d6eac8867fc7196f6c3a4f37f11dceb4018adb648a7a16306afe814382f6404be05cd882b1c893957019996ec3f2e8ff21a80d85503e84b084d7a34d476bec36f09e2f1cb40b5e8f4e632a32f64660adef696749a36c0e7bc1d37f814aa7485da4940c75ea25395c61bf1ab475ce2544be0aed0548e77f6d18d2d4d6c8e097b00ee64dee57610d5f19356950af3ad9fba8d18e925afb117eec0846c71638014aa0305e6119c25b653971f60f6e0387f396af4e7c90d6fb7d8e2bdcf7f07992dffff3ef7cdd1fdf9c66af49d22451f8c807be5405e89fc740dc7ccddcdf614becb09ac8845039b40ada60e80905198516903051290afd57d169c9a9c87eba2104a30c1178a79b4072bf213663c66d83a5e2cf54e7ca68c87c094c573d8c9c5d30f6d48d4954ba2070c145558cb67844aa2193b4f6436849ff364f447bf7485fd6193db3d7d12453fc92c2869427ace3f03a921a1395a0eb52276d1a9e91f1f55017eaf13ac96bc6556dd61305bd21190d85d4573be5d0e40aeacc2856119837c775c47b6c170ca6c9ce08d92f7fa6bf4771fc598e4a40a88626cae42200f5cefacbb8f6f40b3492904c166ad91fa3aff00868ec44e2d25ec9ab82eeb44dab2e0ab7bb011e13b6157334f86bebfbd00910eeb235c235a09ec328984db8e1eda6a8158171899465aceeddae0395d850c95aa31aa6dfdfb586a48636a858b59c51e6e80ee042d6a5968034e358cd7c8cf00a974beabad112828b17028d4240b94c9b820410282c122447a53d629a9814490543119552d9853ef794445584d48a07e6afbc93e04321dfa74efbcbdf9ed7d684e6f18d334683c168561e5e3abb0114badb021899daae10588d76a50cbb5fa5f7daf34f7bb4e09b3153ef1a95fcfe6cfa6a5e56090378655424843beb48fa98596f8349ccaa9bbc2aa07256219a6cdcb0e5a0190e99a8d0f7ea50fddb6961a3bd6333019a601aaf5463cb98b4806801538514ddd6691b2fbf89c537638273efed15a4c0490693232e4609cf34cc938118f63ca18c2442ffb7f891e9fdf2bbe94e7aa414cc84a5e399f723761aceda9b698a017cc0a13a1abf157c45165c3d90e895368a7018d12325ab11da48470f6beffe87c7c8dab1aee93b61d4b1933982545ad609f8c7f45200c4731942fbe301f9a00c95e58c8e9018577c4e5a9d59a0971701e69edd9af24871f8c44999bfdb7990f76935cf86f680898c8125a83ea6f6892fe9e202a32b19a4e4b432a9198f9ccc673ca436d4505c76a97bd00e40a98d8d1e549a714d789ca368ff3333a8d0b196235a1bf0fd984eec26077dce7e5d174200b3aeae84fbf86504ee8ecc5fb1baa8556dcb05276f1d2a77d155d699768727dd50c2a64e251a8cb11b48fcba3a65b29010d855ac5cf23620384fda8bdbf21450caebcdccc92582ddb4e9f2c0b5b50671991f00173530b061fd95bd7dcaa4d176455e920004c542033193c28b4747a397559e262e45581e16fdd619501f5aa23349fd687874d7828819b69f3ae298d6cb5f9d5e74e32fafc708f293c43da41446eb759b1232164f00d503f7ef3f88a5f743bc44741a272bc9c641d68aca73c47ab13a4752110e8317cec2dff5d929fa9a5716f426ead157077e4c46f21ed3ad62ba162a74cbe4a1cc2e4f5a1527584a21fe98bb51f4c6986f489e0a092cb7a22357a09eb166ee6d4b61c27ee238381a5b9a8d5dbfdd886e0b11aaee72568badf7d022aba158c30d440ccd544393e1e57ee6533b0ca2499ec79d64429413aae8fb5cbb7312d7fd658d41d3bbb73bc1922e5e63949ec4b3767fb81e4a957e19e8080cf93ab06b99fb48167dfebfd050b8af4caf79c2bf8d8b7967b307b1795cec64e05b314a5c8b61ed4bc96a9a68159643c06d4068306d686b850c7288885c3cea97e443420eda5325e1d6cc2f2dc8a690068db0b5d148939417314087d7d5bf30685c8d6899c63806110e504179c8fa8c438bebf63b4d6f58c962fb6149330004931f0a4627ae447149793048ebbfe0434846a4bb8d2361ef27cba9fbad3f5930c0dc33ae9965bf5cb9e15ee683bdae0b5826279432f07bef70090025d9c267033d9c3088d9816c233dbac37d0e23f3ea9c07f6fcfdce6c88151b0efdd121ff3a1858a0b3a846b29efad00d1345a9cd43174cb90c61c4246c0a105118ce7ec146dd0de88f962ab8650e847dfc50266e56d31221a9ce9611cd9ded177446f72d0871f3fd9fdc4b3fa6c1636d42172becfd3c36088e3c93ac993d2554458c7d65602e8e3a0a8eb34a1d5478cd273d8fced50a98fc7972be3b50bb9f5497d3ff3fecef998db47b134bc428d9bd87cf7b6c15ce8e8bd2c0b7dd35dc2b5e6f9b1cfc4489ac0460cdbdd5890e689cddfa20ff60a1f194ed76d7764c64dd3d6eecff05cbb8e358d7d2dc2336f21ebbe98452379dec04504ed5c52e869d8f6b285947386046a07839a2b6084ab14ffeda4fd35cbf1932c31b593088ea7084ace251bb85ad00c67bc2e09e9a9ad8703136561b43fed2d4a9957a40b5fa3c05da39cbe8cd24e3b5fe1fface0f852e89f28a51e8d95bd43bccc5170535c90ffcf6d488fe1e3f787fb3796cdbdb1e9bf230ab552c76135cacffa0e97a13dc0b04f781ecff2748b8af48e08ba120ee6df8dc90061facc4c4c32cffbd0433023b9f0d4b412598dacf444968126e0652ceb95f24e78bae8b9b695b4d42068db378308a37e4bcdf4d7100d9e75e21a428fe47c5c784325fbcb2ca1435ce36285b9581f0253a360b9645e434a2c7c9fc5823310c6b3692900b5969992a2065713a6833a693be44839ffa7a6ce9140ecb4094edd1e5f154d37bec3296b386120ed1acacb1480e4fd7f0df2479ebca9ea2d264a0cc98a131fecdf4a58108e5418dc266816cde75b04b03db058243fb399c6edc9beb5df67af4264b0b4a311076bd808e2faecc4cb9ec17f804c4a54684287284d37a05f77be8bb466f7bb048d964f139a9f001cd55668e6cfd60a7e69b190ead18183d2bba433e9571bca9a5af0d2afebe11ab0fc7658ad1ad52c329766a4287b89b5d72b07c6becf0ee17ff243ba43fe62da51c1494207e9908389981ad4e16e672a162d0b91b837a8e157b0bbbe24e538c5245ea928e4aecd4a3e818537dd362a82db5080c162f415da661031ab7f878c9df6a757e7fa4e71d143e6b2a991326ba760e2b59512e854c2da0f243a86bf35c6d02ed985d27f09363715b9b1d3a498aab690db079e27311efc241eb07afa20eb998a6fdb7b04c7d53e5097880e0226af031ad4e38082b53580829c03afe48c345a42fda3bc6c344ede818c06fcf8d09fd9fa978064abb201ed6cf6f98f731b5ccc07c29e981c2315b4fe3743c616ae0461c105439631693dae89c9656138751e325f8df26f49491b677b4343cb4f1486293e92239c59d726ac85f40793f7e8d245c91eff5ea9f6a5bf3da42d6966f9183d19228f1cd7e3af1b3ad5eb8530d675fa18a1972cbcb5a19b79cf928da2be49372f1ae565177ec92a71c1b8f1ce1aeea534de2dc5b78aa70146755e970579cb06b19011ae80034601bcb1fa2c99e5d9f32ed78ca51076dab4f451a42ef31bae19f61aa4a273c26619999b7309e2b6fc4e274a4f55e1616d9b9bf990f39bc0e454b28b2572049769db95644e0b386b52934b44d49b275156866d36a5527cf2eb59978aac66d5d77ca00f6e96d1c81d5184d7799582ac3a7ebbc79a1d339c3c957febf491d8f03cb179ddda5dbbece4956f768142f3ee5598e14850b72f1fee5485d1a1f2a323fc5a12d3534c36b62bd941b80001a3e8943b9eef1d1c44cb983849f444c36646550b23557cc7b8087715ed8382195ef2d26208dccbb0bd06c4b9219e4c9aee38775ffc9c4c7f8e7ebd6f35bd77b8004a33a1608125ea348b83e209ad0b9cecd4990a9944f0c95cf9efcb9c5003980b4f138cee2c81a35893c40bf6fec09fc45df1de9b60a2869967c83ffcc31f0f537fcdf0e7aed178a93475925ccef8ad437bcbc77ddd4769287029c79bacaa8573e3e5eb509e3f058076efdc3558e067ccfffa2b65aaa7cd548843c30a232d6d1b700c0e8269b1424b7a62d3e26fef17bcc3cb3692ca7805176477c61fefb77fa6a0d56b021165e85fd28be7a0346a01c5b923d61b8d4bf09bab4438a773855e6ee762daeb9eda4045075605d3d94864ad65fa719895d8ac8f502864400c92ecdf896c19f95a9932de660ce8d6f2c7184ab82070ebd2322cf932250718bf90bbe42753eedb4fd017be9304e6add7e11401e770e0275488b9d22d5dc9bb28ac5a46d37a58384d726a3046021ce4beef106feeee2eb7b40806e43f09be14a885ed4c79ff9d485b03302947a10f6f17b88416c248f872a967c336b4132ad72afcce64de22dd1df33bde7e923b30792bce49058739f79802885b9f6640d2fb1cd5957833dabf1fc75ec6b070266db914d7dfd0ddd625a82ddccb350266b0fb3caf34f91e2156d29c6b6ba0e848dc88ab0539843e0ab100665f7110cb252f32e518f539271faa4352229e7d9e86add0222ffc34366412da4a35ac085268daed4d7ecb10e7e4a63922a31c38cbf5984044ae7bed1c4ad5f7d3b8451fc2fb7c5f6835cb06a04101c93c89513cd786bae8baa243dfd08166b22e9c16cdda7c469eadd994fc96131fcf4460dd857a6597cdffec1290abeeadadb5052a62a75bffa066d83e033240f70b8364c51da8e83b5c61337425c3d9fc2994ca81bee6a6e6bcd6cfb8ce5a63a97998939c4ecaa62cc7d2c7e9930dd8bc221ebc88c86e6dc7907cb3c9981904181429b5e0ef637237d1bbaca9e37a12662fc24de82e88b02320d8242b5faedecdc4799685ffba94b38ff3e9e2b0c4e5af241a0583dbcaafd4892320891d6a296b4f3f6bdfe800976a78235cd5e523428554eb1"}], 0x13d0}}, {{&(0x7f0000006c00)=@caif=@dbg={0x25, 0x4, 0x9}, 0x80, &(0x7f0000007e80)=[{&(0x7f0000006c80)="1167b264b3acc652b8edc1e8770a137ca80b092057807b4451cb2874ce75dbc0827abaaabb0b97a0b842a866c9f153d250c81102e3e6e19013b32ab6cf58c7ed11e23e0402fd712870ae717bba5a7e0f02daddea5a460eccbabfcb5e80836f7e3907f8032f2778f22f623b33cc93da05df732aff0eaed1d179b79a2a54c09ac7924b3dd44be9dead1903f3a9afe024265c99c945145742d0ecd1d5611099478fcdeda8b52867f9d23b87647cbdc2c209a1ff91196e057a8f923e3175ab12302773fdf881f3ae96", 0xc7}, {&(0x7f0000006d80)}, {&(0x7f0000006dc0)="73c4cdd4a02d56bee7cb24eb0e3a1f3a25ff8742616fb2", 0x17}, {&(0x7f0000006e00)="c36005761b16dd79b0b4628e392875db8c519bfd2624cb3b1dff74d2f1ab5a8dd60294265ed145956c1738d2c2177ea016e49b032e113dc1ce8a2c98d1ab08d313883276387b346cedcd35cdaed90c9bea32293d4c9beb1b3bab3932ef0505e5a4d379f5575b72b38873376fedd9daea2336eef9d40de5", 0x77}, {&(0x7f0000006e80)="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", 0x1000}], 0x5, &(0x7f0000007f00)=[{0xc0, 0x110, 0x21a, "2ca0cd38cb973f5e9aecf051e49fa493db2259df96d5f8ed44dfa8d62857f21a6561872932a4d656a13e6855852438bf2dd636455858c8c97094c40f91c3b240c042d95a0847e8594cef0988291556dbfc12dd76c7bea1e99489ea533c566c0032a983abaee86fe74894d743807725019810ca9458dd46c549780e2b2a7a0fcbf26c5922148dea9fb0799288df68568e6f04b1bdc57eaa4c6aab76466dc22774bc60ffafa028c0837e"}], 0xc0}}, {{&(0x7f0000007fc0)=@ll={0x11, 0x1b, r7, 0x1, 0x7f, 0x6, @random="371e593d6998"}, 0x80, &(0x7f00000081c0)=[{&(0x7f0000008040)="c12cfaa1698ed6c5323eb1b186061fb36878f366", 0x14}, {&(0x7f0000008080)="60568888802d6fc096", 0x9}, {&(0x7f00000080c0)="1998472ed28d20d5e9a06295591bd1da9df6de22aabb2993d3f96cda992cac9066a7713659d49e52dc1f40ee7124b90cdaa284edff736e95b2df82f583a0c850cfe27d4ea5aec5d8013cfd167c48e4124d8bd4504af0a8d803367946cc2505464adfc580851312052a62e54f34fd3235728a17ce4b6e0310a5b8ecc70a214d02adb51b6b9c91474bb83c27f40d55022407fdf6c3c35b76e8b07d937c3405133e0eb9018559322ebba83273e34cda20dfb0ba4faf75079d8d1a93003a169658308ce4d7ee8eb2f466c58b1711ba1c34d929dab2fbeff097834170762edffcd521c1", 0xe1}], 0x3, &(0x7f0000008200)=[{0x1010, 0x10e, 0x1, "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"}, {0x80, 0x10d, 0xfff, "8c0400b467f8dbb60250015214fa5087bf43fa9b6137dcc4471f70434c0bc06d276f49cc4843185fc04b33075ff922572f7ffabcd57e02ac6967e78ae5f61ba90e411fde49459ef31de47d061f743dca932d412bd5c0fea9d563ab5a5e4c6b2d8378004437c1b595991b17fe"}, {0xc8, 0xff, 0x2ae3, "18d50db032af5341920e2412cbe5eb7a81e840374c5e49512516969a3733b3ecf324720aa85b09e6e9626c439be80cdcdb1f14002364e723e9260ff7880432a5071bd4d13f5a087a2f384521a195b668e997a5bedee8345a5947f1116e6307abf7bf242867faad3b57f4f43605697b4c7e276c5bd3eba13609955872ffade36373816cc70f06604c4c0accff9a47500860203e695712c8eccc079a600e64bc9a2945e206f498e5b9283f509811dcd2f99255139f"}], 0x1158}}, {{&(0x7f0000009380)=@caif=@dbg={0x25, 0xa, 0x40}, 0x80, &(0x7f0000009500)=[{&(0x7f0000009400)="f54f33494caf2ff0b78e85cd98b8c895109db68441d99ce2abb096f1700ae15c18e8dad48c9c63309725f595463f20af49612b1063c72290d23a4b1230810c0904e092b0a85dd574f69fb3399fc31d3789d3c4cbd296d9a5d3b2d3968a8f309c81e5b92f201c91e364a7795ffe34e2ebcb9e3c24a8aea6be8e25ab3573ffcb1920164813c6ad95281ee62d23f2ddeb25f204ee553849f72a4bf7d6dd8ca863f66c3335b08075d6ce8b02178e5aaea38d978e378ba07fe54ab137ee31484b9bd75161a8f494", 0xc5}], 0x1}}, {{&(0x7f0000009540)=@pppoe={0x18, 0x0, {0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2c}, 'tunl0\x00'}}, 0x80, &(0x7f0000009980)=[{&(0x7f00000095c0)="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", 0xff}, {&(0x7f00000096c0)="abf8956047eca3b06c8ee92cf93711dad376d5347cfbedf9369dad5e3077e43000c720ebc45a83316ba7e43b1672a578231f9a43aeb89c614a40e1b5ddf3ede47ec16b383603514f91ba4669c0185e17dd2921bb20d1fd9a99036adc44cc5661a171143e62bb1b0dbc12bbd011ff9a9652261a67618092b4a16f2575701712cc2eee4800fceedfb952151176f3993753b3918598bf915a3960a80a15e9444b1670ff68b45f11364559e503267e884f9db799e154", 0xb4}, {&(0x7f0000009780)="d778e26a1b25573f29c2c321efbc09e908b8a0936bf9ce0ed0a26a1a579e923e19cdc45779505f47378b85f650cca1baf4a9a77a2d64a437ffd2cd3e3ce92a0ae7ce52e58655d72f5cb05abb62b3d4287df877183ca384fda9edf4f0c0ac3ec3803c15f1df992d6dc25b484ca4bf7e137b54e5413bf5bfae70d17fac6a9dfc49b57ab642bb8d781b9a0db0f2c2cb73f8c1fdcb87abe7f0082f11f571b21d0987aade636d8d692b87cd411ae7f980b20dec0ca03fed8a7063a3340e0f0366c13a21bbee93d5038975d7ce2153663cb3c3734809", 0xd3}, {&(0x7f0000009880)="ba4e842e07040de8f46cd114eece8e74fc12a4da466b738f669279ea14ad87d3390aea321d0d0f3102f798020e6ef01f0b02da6f66940b44643b7518275d33faa83a7e43d2088049a8c3475099838fecc740c6b9597efb1ce683dd438595b3eb9243aa", 0x63}, {&(0x7f0000009900)="e2917db461d720dda150f1f809bd9693e2c4ae726b45e1735c33cef196a82a20269882ee05f42ce71386a854d2eaa0bfd02c2f81f9a71ae46b6da098d526c8b147e655298613957d4736cfeace", 0x4d}], 0x5}}, {{&(0x7f0000009a00)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000009b80)=[{&(0x7f0000009a80)="62c8c04745e1bd267892ee137d06b93ba5b428a756b99fc0b9f338c89066c47a065b43174f63f46dac448abafe6f656ea0636a54fad45ee9f2a5c8a02aaa48a80299f66964011fd8140db42abe203f509fcc4599403a103944fd8c5b588ea6d213f0cefb018b448c002b7c55f0f2532a9aab5b475b6fcb4c10b3abbdde7fefb9a154008acef68cd618dce53e9dcd4a0d74686d8cd2056e2862165c61107729241bf3573ef23e8c771fe3854d9a7ff836a9b4aaa5c4adf3c7c30d47da475b29a08eb0a39eea2cc19785ea4daffc99b473f8b459c91add", 0xd6}], 0x1, &(0x7f0000009bc0)=[{0x70, 0x110, 0x5, "636b494fbdfe9334cab4d7245b1c187ee8a149d22d8dc3e1ec6ecfbc9c468bc3dcd43625eeb36d40dad23312237caaf8b6e6a3700a0750218ab7e593a8186803f76241f6092aa82994313d61a390bc0fe208e80129cbf6f42f13de71e216"}, {0xc8, 0x112, 0x0, "2263420f4ae92b3075179912d93bd5a6114880b1c2b74c5d4497e42361f9e8c1ba2e9f540ab5f5823e52790dccbb427a62b7cdcfba6a4ac130056ecca23e93e10965906f7654f10aa9504961e6288a00889991a270719abaf9dbf977052bf084733cc8f539c2b182a41ff009f833d46eb80221dbd1b7b5f5b0ea60c61bb6cb66662b7afe1637aa2f90fc0d9e12aae2f741eef23b86624a6386f4cadb3f2a1784a9215a3151bb011444e6488cd553b27ec70d5f1434a9ffa9"}, {0x40, 0x3a, 0xa3c0, "294f714f407c066210a10fcc68db3d44a2437aa4ec989df11ad6c9df8ad03368e89432785ce810ed9515c92c076329"}, {0xd8, 0x0, 0xffff, "19e2e7c0bcc888e626446d54470dff8e842c03578fcae956eeaa882657428fe2b6fca8591970eb1efd8b1debf260ac3cc089e36c5a18e9efeb9603c8cb2aa7e9021a3823b43ea9ab23ab366ccce9db8a0cfe87d9db5510e3be5efd8ba548c9512866d73cb0acaaf43ed986d25db99657862c96f13b4ef60fa54b6c5ee925289953ae7c232c278042c09e0b84fa35bb1f08807b88e52d3605a9d9f2dcb0782d04b6575fc85967b98be90a273d50a141a8c415b27044fa8d8c63cacdda70d2aab570c109b9"}, {0xc8, 0x100, 0x7fff, "61951a2a3d5ceae6f73a8e2b03fcc5140780c2a55721d3c6044a932034d3fb6b42d6c6d62cc64cff7cc71ae7a4225fc9a151628041d3c043addebc895a88ff9b93d57e2d4b7fa45d1d4c3321c288e8d2c2974f7f018780cffa5fb48f7678cd47c84aa4c0c11c684e5ff49547931bf4de79212d732869fbf2d8ecc0cebebf59bbc874fd4ee34c0f514a910741c8840b3ecd1b4870040bca287dd13839614c5911d1d9288f880ef042d9613b7fba1e74c5f7db364c"}, {0x78, 0x1, 0x8, "88e0672268e76eee5885b08c404a17dc3f20b078f6cf79efd7874f0bbf1a66b000c79658c8d06214619485600f522dd5157d70b94f7421c69ead7d6cc201afde8badd64c92c16eee07ded185c6ffc79fcd832e5fac52d56dece6f4954d380efa3eb406"}], 0x390}}, {{0x0, 0x0, &(0x7f000000b080)=[{&(0x7f0000009f80)="c790e08abd38b87c1cc6742882d7410a3247099c6d9922e96d29b5850c7febcf5d45ced1c7b86e5be4131f29ad569bf1f39d995295316397b43a9ed49322450225bc92fca6a94c41acd1987e0da9554fe0aa470483dda9e521e5dc4b824bcacd0680d48367e1ec83739daf35ba176b323595b7e64f4fc713906bd073d83bed62b9d205f78f7bf02f100d793342ff732cedcef64d2de0675a344edb479164d0ad78df8c7be352484d8bfb9f461d2617997b30e7f80c33f3674b1f3751d2258ad396e54d9765632f02282d6d94787c0d089f6d0c326c0cc42c9ba907aa8ac318d644f8e9cbab26d878de5b536fbfe9ee31c77cdd09c13582bfd604a9e891800c7396c0e772fdb13cfff40c650c618ca94691d2b71ddb5f7960403178e46c7c65cd6efc15e30c4044d85a2f336e7e63735c8e088fca0a2e1022bc792d4a67094082e92d2bc55592f7779f34fd442bb4f50b07704fb23079a4b88483986eaad3f555cba8c42ea8a53c728672485d8c550b0e7be53c5eddefe08716491bdd8139bbc94f82c8d8a8d7379ad627ba4f7560bcbd5c1886946d074838f75ab23af45e68c18ce1633ee148d445d3567c4e6ffa5fc285649f5b3aa2ac0416fff8ee29693568e40d3828c1913f32346768a855ddf0b250671d87f8b1bc41d30255fc1c866c50e101a88bed8a80892477e053904850605ef70f116c0faeb8e000c33addae4173e153bc27219d75a36f4efa7962815793c3a17f02d8aeb103954cd4366e75ee3dccf2e10a4ab074f6d1f980ed06331b124adabf1693ebccf1aea6c2f4dd6d6a512e14cf8f91aafb93501c26801fd4f627767e7a64d450d0ab7ee33c2234e65cbd9ce7fb0ceae9f5c07ef8ab1a46ecde289cd54532c8cb8faa9c3cf854dd7825695449b604164b4bc59a3672c9341c2baf66e9d45e0a0b6febd574fc4d72ba62e179ee142c3dba49f50990d9bfe44aae486cd3e6e61c8a2df62ab0a1fe9a3ac8664259e7073d262620a1c635b205949b6bfe9bf3877789a5d09d04da40e3423fa984555ead02e9e0cc4e4d3697fc90b35a1ed84fd66c54e5b5d8ffbe71b860f6c940eb72f264b55c39b37f46e161f447bda4c94cc95b1405c1c3a79fcc9eec54ee781039e46508b0da3103e14cb27c7d8dabd8244e160fdc109fd9a40bb01e095f0a34a66a3c6b64aa4c011581ddcb9f32cd0b1e91c5146ad297fa05b7002c478de75df17715114fc4b7e4ef9dafdd2dee8f5304d66c634935f2f6dc1897abb94c25b1b852720ca4e9d9cfab77b750d4b472e314c132266d073ec881d9d3749e14dc92ae2af001830f20d2b8270268c66951c8a144a5e273ce79a2ff8393d99f7af130028f8c59fdb468720d2e54a648434c7fb7c5f61dad3d69bda3b6ecc15eebedc6749b5fae237bf757544fa09f009cc10beaccb44b21d72701872af664523f3c8217301e4099b80b544e2e6b18237b2de046ac9511b97339ab6e6f4a965d2ccaddf10e5a9b4639292b4ff5aa8f9ea45596973196214983dd86fffed31fcc5f8f546412d9969801877f2d3554017f67571a461279eb2344ab103cf22f1f3f808689333f2f3ab8d9209273673858bf0a2f675fc926c714e5118b1a5e129d1bf9e0705d4f86e1591b2f72e3e24bb3bd0427e4c74b3d3efe528f9bc388e521a103c84273a66b2ebabe246448a0adc99c159357f7837ac1ac02f25cf5ec0e5f2562514cd48c2d9ba2f1c624bc456f72023b4f3662ca5a1c0399f161c7eaa67a109c8d0284ce1042e34773db86d7d31870c4d5c2257ea7ce9af8eff3a5c70a0380798ad5372887fe412b6800c16b75a4adbe13226933bb4c37c469ad53e869337f66d515e783d2bb315b396e5e7404e6025bc7bd656997006be33e046c3238ea3822fab4439a1b76ee98d0131efc8e8779ea38df2ad067be4c710046f0e5964acbbf53c90dabc7d625d6c4f2f19de777dce44ad2528f5434fb7b81c05f11538c46381b684cc5d2d6a246e8f3d8cdda902bc7d105be745e63f1f9f5d47e94015413c839cd4e04b6a2e94a54a51da15384536f0ee7d338bad50052b8291c48cdf557837284cf0c94ca8663e6e1faa5ca3b4eb4b6552341ef77d095e7a33d54f029bf27ed0788d5d7fe06dd689cd87e3b7b2e8280a1c3b6f47e4a2210f4b4594c712c4d5784ec167f2bddbacba81ba82fd06dd2412c1add0afaccbacd67845545141e9eee15b1f58db8019f3777dba88eb177cbe68ddadea180f89a18dc254b3562d2f0223b59c418bb7c633b92530cd23886f92de481f8e63d4e1599583e1560e0c7b56d4f0f4911007758c64e745cfdb9c5f89f9a75a2bc81495e8232623b3445a3a6c13be0ad2a9a6d24a6d0b60aa0f1319ccfb39ae2e61b5a80cce8f1abeca6f0bb1c3517970bf76479782209d29680bc6ae280e0c8efdae6945b91984dc09205d9f84126027273af20e52b9054a18cff86ebd24ef5d4a9af98ef013f0d43e6352e2514a4a92249930007cb868807ae2ee60cb553c614d55196792c24bda0dc7ef6c5f3472fe5af3c6e8758956223e887c0a44e0767d72b2dcf17c1942a075432be1e16b84778adec93df8aacf3c747506dd551e00c129052f201fe6282229e4e04cd6a5beb2085c86c769eb4f863a627a7b247ba0092b2b36c57e0595e1052b111cf650d09f72868b6155ac3b3ba0e9edad8d683cb9548c5e0051a37dd907d1f9b0e871d485eeedc82cce1a7672237a16b6426a578ae967eab281303eef4d9142b50124eb559d5b32b93ebe480326691289a46067e56576865bf6807a01c61400f33ef2ba89e14b1aa874c2f80c49d764fac4bd07b376eee30e1443de4e1e7c51aee379720cb77ef988bc7ce1a9d6ead0733e488030d144288d4855f87dc1a7668b45bb90a68fd20a63b96ce7841f44b8dde982b0204e501f498a3a162577a6cfa44735b9b315e8f14b111665f665508e9144157a8bf4942d3361cde9d1d866f3e755d26b80b186ebb8ed97c9dfe5021cfa5912050696aa7d8602bf800698ff37f2b9f5e392b706c7f147388882e7d25f33de9431704c3e2361e99b008c8d8ac8df08acb118396e8fd57e1c2c68f07480529e965bfc85788f45ff12cddc9f427c3a7bdeabd332af9b93e7c1fd5277ad34210d20b34f3a8ea4d83d2014560f91bfe78aa90177fcdaf2fb333c50559e25adfa9a992e82ae87333dde98863c56844388a8df9fb16a4929501974fded5128394ce891a7e3c25f7bc807d72bbc08e2ac93d4b7c93fa718dbbaade57f507988458e89523a9e44e927b37d3e48f0b46ce44ce049b9e75b406e62029f842ef570157cc93692f44e1f67e15f11ea9459c842efdb9eb79f152494a9ebda5e64b4c6d7cf3c9243b8e5daee7e7b3961d797d47e6c2edc005ffa6d82e31f68d1be9f05098cd3206366558408440a99d90dd613b4409f531bbc5f057c2c0ca8d7750194681dfd197dea1d589e9fbb964e565dd0b167085d4854490c3fe9313e98f83f19cd90b61bd7d6fe796509a98db2f28d98ca2a81ddb025c5b5f00a84685bb53ffd4f4d4fc75255f45aeb449eb115583797e6867c7f2f1d6066a40148450aa9b66d4a85f3006a7919450bba8048643b7ea3dd4a61c3e7353ef518ba764fda52152b6c51043cad2eb63d64c24b27e745748a8b848133ec2be96f919c86753a92d82957a909f80d20c64e5e72b5d0dd92ab472ef8f64b334a7337a8245e40cbc18f2a3b81285bcf88d34db1ed0fe448101c1b522d7add38c38ae03ea7eb62bd811c50a257feef0c4eb009a71d1d259e59656eb950b29ce3894f56df295a70804e6e64a4f86609ef00507c48ddf9f67abfec057bbdf0689a3f60f9118c27857623687adb1a791d53eefeb68242a8b14531f7671c778699be9eddc66aac4232109ad4dccc98ceb34e0c63f927d9a584f4e93ff8dc47ea00df9bc474206960cb1a05ccb7fa752cc87ba485ffbca3241611a9fc22a7b6549ed39d18a4e8f38c8d9adbe8b2c4ea6b250311b3e3dd45da9a95e9f3d512f6fa05a4aa09a928a80e9b8d856b1275262dbfb68aa31c9d60250cb191171ba2008899a96779ff9e77f7a3be3ebad484078a9e3f05a9eeffaffb8a0cc4b43bce0048e19b66a1bf085fc28f44c1a86199db8fa56b8dbca2a3bbd6246361edf0ad92a1b8c6679f1e7ba9aca15483c97adb7287559121a8a7483e3b4504da06b14480871da90434e51624b8486b2f86c3c4a8503411700a5f779cb5995d1df7d6d6f9e6797d5e4c81a991ab7a6fd44700f3ffa7fa001422e60a75361b4fe6be891d5bfbda7f9d01e02534728d0a067da816c95167eafcf46313ec0faf1167e68e2ef2c2751cc4a0b5e8edd1cd1e50c3b9c36dd23c75d2168dbe92713f801864a2ed56b82b5ad8d7b3fe51be364fc5d7431252be4c6b9904e4fdc75913e3b52d41a8e1a54ccd26e1572de5b53fb6680e61919500e302c2bc75aa2eb05bef3cd2981ef5cb71d37dfac2a975ffc5ec11f0108cc23cf600419416714387b9c4b94c33e62b1f6bc154ed5e4f2a3110b73b9b45a9a78abed99ca5fd91218a7a33ffcaf873d1cdcaa0046940db967ef71693f432326cdc56a68c41e6c226190068774ad8f14f7589079c5048f752ff732a696e9a3ed5e8f2c82d67f39ec6c739d3d532f051b68c8b734f6af20f64e5c669ae4b63817365daeac0195abe1f3afd4ce61be9660731fb975bf605ef4b6175c279e2b198a80026541b8b3308819f270f15c7d0315a0780cb53988139f0d491da54f5313bac0a0627ced20f8d93d6b31f8fceb38b0c639dd8301d254e5e827329b07d17c6c5ba10e153169dfa420bd6d9a29aa617f633e4802b67a56926ac5b37c7efa7728a1ade939761c808740095afdff7031776d7d19009eaccce8fdf053f3fcbc15a13ead5f674718abe6436e2a1de473d5622313416538c446588d538a8eed45f000e700cc049f358e0c7208bcbcadfc2327b4e77bd483b5a4694a55dc200d8e4b470e4e116c44f0404cd7752e5186a1c2ce08ebf5a673bd3ad3b682bcdad401e72d90c1dbd1bf6a3204aa9fa90605f8fe418910edf1fa53f8f7667962cc3b9e091b64b436b91ab6d92a4e4be83ca50c9bb8f117d74a09d24d4b3fc0efb4616bbcfd9440794ee39a2f6701c147888ee028d378679a339af07340010e0b99d27d58cec745e8adc9331014dfd93eb103e9c1a894ac6d59218ff8bdc0f1a279d5c5e13fa32b9b6a6a92647ea562c73ac6accfe2ab575b77b4b5029b6ba406b87131965c5c3337a94fee8842793c2ba5c7174b2ff50b7fcd7cb9f707393ed4aa03fe8d2671543f6d2c9366325e4b4758b86f344cb70437acb0c9cdee08d0c9dcbeb5c847f615eb9516ebc9dce4e6a071e44cf0fd3ecb63604128e2e35ee3e8e705e03b3b79f684bf054dd0527b59c1b9895b3f040a3ac12165cc249af41c09e94a291fcc06f379b20f677559876c01d67acbb20174f42efcbea92b082280f27f2649f9fa471e9aadc943bebabedcfe43e4668624c64c7570fe03907ec3675c2c3fc7f75e3026149bc946d267f0d5dd6c5868decbee80baa70d2827c72b3c01dcdc1d7341aafaed250d511712af30e2fef6d8da82b7b0e0d5f27e3271c7c208168dda6790830ed34997ad8f40069d9c02a4aae25d953ab7397ca3d47069acd832774384a6d10420b1375c5d17c4a7d8fd55657ef064ba56f6e78325d0f812c7c5522f97d6faa13eaec931510df763cec94cef2d36c410158a41e2d3c7cc38da9d2ef9ee2fab9d33aa78ec0f26518900cd5bdb435f", 0x1000}, {&(0x7f000000af80)="bd844ca65da606e8affe795b2605d73f6057f4d896a2b1d8b6e56e51d3b482c8fd67b3d1c0ae638c0f64c512c14f866072edfef6037e50d17920e81702e53dc40e6b0417753c7bb6d245cc9416e5a21d34db30083b1d6c6e62253e", 0x5b}, {&(0x7f000000b000)="1d170fefc13d38e052a2180b6183427f253ad45de65275131478a6e878d665598244f7f85b9c57d39fe54369b3d66fc231fec36f22e533320f4b96f7b6aedff81d416e390bed904e12366f80fc79a9a27ee7816c8db8b34aa85ddc1c38ec18533e5e424030191e086720aec337a421", 0x6f}], 0x3, &(0x7f000000b0c0)=[{0x28, 0x10c, 0x40, "432d5618f263cbcdbcb2fd1b40fae34c8a6a"}], 0x28}}], 0x9, 0x40000) shutdown(r5, 0x0) recvmmsg(r5, &(0x7f0000002bc0)=[{{&(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)=""/133, 0x85}, {&(0x7f00000002c0)=""/24, 0x18}, {&(0x7f0000000300)=""/22, 0x16}], 0x3, &(0x7f0000000380)=""/120, 0x78}, 0x80}, {{&(0x7f0000000400)=@nl=@proc, 0x80, &(0x7f0000000480), 0x0, &(0x7f00000004c0)=""/243, 0xf3}, 0x6}, {{&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000640)=""/31, 0x1f}, {&(0x7f0000000680)=""/135, 0x87}, {&(0x7f0000000740)=""/239, 0xef}, {&(0x7f0000000840)=""/144, 0x90}, {&(0x7f0000000900)=""/169, 0xa9}, {&(0x7f00000009c0)=""/60, 0x3c}, {&(0x7f0000000a00)=""/34, 0x22}, {&(0x7f0000000a40)=""/95, 0x5f}], 0x8, &(0x7f0000000b40)=""/182, 0xb6}, 0x75}, {{&(0x7f0000000c00)=@nl, 0x80, &(0x7f0000001080)=[{&(0x7f0000000c80)=""/191, 0xbf}, {&(0x7f0000000d40)=""/114, 0x72}, {&(0x7f0000000dc0)=""/114, 0x72}, {&(0x7f0000000e40)=""/65, 0x41}, {&(0x7f000000b340)=""/72, 0x48}, {&(0x7f0000000f00)=""/121, 0x79}, {&(0x7f0000000f80)=""/22, 0x16}, {&(0x7f0000000fc0)=""/116, 0x74}, {&(0x7f0000001040)=""/13, 0xd}], 0x9, &(0x7f0000001140)=""/243, 0xf3}, 0x1}, {{&(0x7f0000001240)=@in={0x2, 0x0, @private}, 0x80, &(0x7f000000b3c0)=[{&(0x7f00000012c0)=""/31, 0x1f}, {&(0x7f0000001300)=""/157, 0x9d}, {&(0x7f00000013c0)=""/160, 0xa0}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/1, 0x1}, {&(0x7f00000024c0)=""/164, 0xa4}, {&(0x7f0000002580)=""/38, 0x26}, {&(0x7f0000000ec0)=""/52, 0x34}], 0x8, &(0x7f0000002640)=""/168, 0xa8}, 0xfff}, {{&(0x7f0000002700)=@pptp, 0x80, &(0x7f0000002b00)=[{&(0x7f0000002780)=""/252, 0xfc}, {&(0x7f0000002880)=""/204, 0xcc}, {&(0x7f0000002980)=""/134, 0x86}, {&(0x7f0000002a40)=""/103, 0x67}, {&(0x7f0000002ac0)=""/11, 0xb}], 0x5, &(0x7f0000002b80)=""/58, 0x3a}, 0x1ff}], 0x6, 0x40, 0x0) lseek(r2, 0x1000000000000003, 0x0) 19:55:01 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x11000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:01 executing program 3 (fault-call:3 fault-nth:65): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:01 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x1030000, 0xac141409}}, 0x1c) [ 241.225537][T20921] loop1: p1[EZD] p3 [ 241.229610][T20921] loop1: p1 size 11290111 extends beyond EOD, truncated [ 241.238022][T20921] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000040)=0x7f, 0x4) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@private2, @in=@broadcast, 0x4e20, 0x8, 0x4e21, 0x7ff, 0x2, 0x20, 0x0, 0x89, 0x0, r2}, {0x73e, 0x4, 0x5, 0x7fffffff, 0x4, 0x12f6, 0x7}, {0x4f, 0x80000000, 0x5, 0x1}, 0x3ff, 0x6e6bbd, 0x1, 0x1, 0x2, 0x3}, {{@in6=@local, 0x4d2, 0xfb97339fdc3a0013}, 0xa, @in6=@remote, 0x3502, 0x1, 0x0, 0x14, 0x80000001, 0x6, 0x80}}, 0xe8) sendmmsg(r0, &(0x7f0000001a00)=[{{&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=[{0x28, 0x29, 0x2, "2b07df2fd0846bc0964f4ffde3d917e302"}], 0x28}}], 0x1, 0x0) [ 241.294985][T20983] SELinux: duplicate or incompatible mount options [ 241.305650][T20986] FAULT_INJECTION: forcing a failure. [ 241.305650][T20986] name failslab, interval 1, probability 0, space 0, times 0 [ 241.318315][T20986] CPU: 0 PID: 20986 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 241.327191][T20986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.337292][T20986] Call Trace: [ 241.340572][T20986] dump_stack+0x137/0x19d 19:55:01 executing program 2: r0 = epoll_create(0x95c9) epoll_ctl$EPOLL_CTL_ADD(r0, 0x3, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x2) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000000c0)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000080)) 19:55:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x12000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 241.344919][T20986] should_fail+0x23c/0x250 [ 241.349411][T20986] ? anon_vma_clone+0x8d/0x380 [ 241.354176][T20986] __should_failslab+0x81/0x90 [ 241.358943][T20986] should_failslab+0x5/0x20 [ 241.363447][T20986] kmem_cache_alloc+0x46/0x2f0 [ 241.368273][T20986] anon_vma_clone+0x8d/0x380 [ 241.372870][T20986] anon_vma_fork+0x54/0x2b0 [ 241.377400][T20986] dup_mmap+0x49c/0x9c0 [ 241.381615][T20986] dup_mm+0x7c/0x210 [ 241.385576][T20986] copy_process+0x1203/0x2e00 [ 241.390250][T20986] kernel_clone+0x14b/0x680 19:55:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x20000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 241.394757][T20986] __se_sys_clone3+0x194/0x1d0 [ 241.398746][T21001] SELinux: duplicate or incompatible mount options [ 241.399517][T20986] ? ksys_write+0x148/0x180 [ 241.410578][T20986] ? fpregs_assert_state_consistent+0x7d/0x90 [ 241.416653][T20986] ? exit_to_user_mode_prepare+0x65/0x190 [ 241.422465][T20986] __x64_sys_clone3+0x2d/0x40 [ 241.427145][T20986] do_syscall_64+0x4a/0x90 [ 241.431569][T20986] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 241.437473][T20986] RIP: 0033:0x4665d9 19:55:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x20100000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 241.441393][T20986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 241.448544][T21007] SELinux: duplicate or incompatible mount options [ 241.460997][T20986] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 241.476010][T20986] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 241.483985][T20986] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 19:55:01 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) set_mempolicy(0x1, &(0x7f0000000040)=0x6, 0x7ff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000680), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x40, r2, 0x4308f4f9bf9a6a59, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x18, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x40}}, 0x0) [ 241.491954][T20986] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 241.499945][T20986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 241.507922][T20986] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 241.566343][T21023] loop1: detected capacity change from 0 to 264192 19:55:01 executing program 1: syz_read_part_table(0x8004000000000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:01 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:01 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x2000000, 0xac141409}}, 0x1c) 19:55:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x25000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:01 executing program 3 (fault-call:3 fault-nth:66): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2145e, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000600), 0x5, 0x40440) poll(&(0x7f0000000640)=[{0xffffffffffffffff, 0xa2}, {0xffffffffffffffff, 0x10}, {r0, 0xa000}, {r2, 0x4000}, {r1, 0x11}, {r3, 0x14}], 0x6, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa5f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) r5 = getpid() tkill(r5, 0x1000000000015) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x2, 0xf9, 0x7f, 0x2, 0x0, 0x4, 0xe85420722e73f533, 0x10, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x51e2, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x10000, 0x9, 0x0, 0x8, 0x401, 0x5, 0x1, 0x0, 0x8, 0x0, 0x5}, r5, 0x4, r6, 0x3) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[], 0x208e24b) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000200)={0x0, 0x3, 0x6}) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 241.610582][T21023] loop1: p1[EZD] p3 [ 241.614593][T21023] loop1: p1 size 11290111 extends beyond EOD, truncated [ 241.622788][T21023] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 241.697789][T21048] FAULT_INJECTION: forcing a failure. [ 241.697789][T21048] name failslab, interval 1, probability 0, space 0, times 0 [ 241.710456][T21048] CPU: 1 PID: 21048 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 241.719219][T21048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.719309][T21052] SELinux: duplicate or incompatible mount options [ 241.735930][T21048] Call Trace: [ 241.739199][T21048] dump_stack+0x137/0x19d [ 241.743522][T21048] should_fail+0x23c/0x250 [ 241.748094][T21048] ? anon_vma_fork+0x117/0x2b0 [ 241.752882][T21048] __should_failslab+0x81/0x90 [ 241.757646][T21048] should_failslab+0x5/0x20 [ 241.762130][T21048] kmem_cache_alloc+0x46/0x2f0 [ 241.766876][T21048] ? anon_vma_fork+0xb1/0x2b0 [ 241.771616][T21048] anon_vma_fork+0x117/0x2b0 [ 241.776183][T21048] dup_mmap+0x49c/0x9c0 [ 241.780318][T21048] dup_mm+0x7c/0x210 [ 241.784248][T21048] copy_process+0x1203/0x2e00 [ 241.788915][T21048] kernel_clone+0x14b/0x680 [ 241.793396][T21048] __se_sys_clone3+0x194/0x1d0 [ 241.798243][T21048] ? ksys_write+0x148/0x180 [ 241.802725][T21048] ? fpregs_assert_state_consistent+0x7d/0x90 [ 241.808823][T21048] ? exit_to_user_mode_prepare+0x65/0x190 [ 241.814790][T21048] __x64_sys_clone3+0x2d/0x40 [ 241.819445][T21048] do_syscall_64+0x4a/0x90 [ 241.823906][T21048] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 241.829818][T21048] RIP: 0033:0x4665d9 [ 241.833692][T21048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 241.853386][T21048] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 241.861883][T21048] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 241.869921][T21048] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 241.877882][T21048] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 241.885920][T21048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 241.893869][T21048] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:55:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x39150000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:01 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x3000000, 0xac141409}}, 0x1c) 19:55:01 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:01 executing program 3 (fault-call:3 fault-nth:67): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 241.919889][T21047] loop1: detected capacity change from 0 to 264192 [ 241.980458][T21047] loop1: p1[EZD] p3 [ 241.984518][T21047] loop1: p1 size 11290111 extends beyond EOD, truncated [ 242.023435][T21047] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 242.032237][T21075] FAULT_INJECTION: forcing a failure. [ 242.032237][T21075] name failslab, interval 1, probability 0, space 0, times 0 [ 242.044935][T21075] CPU: 1 PID: 21075 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 242.053701][T21075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.063874][T21075] Call Trace: [ 242.067173][T21075] dump_stack+0x137/0x19d [ 242.071536][T21075] should_fail+0x23c/0x250 [ 242.075963][T21075] ? dup_mmap+0x38e/0x9c0 [ 242.080293][T21075] __should_failslab+0x81/0x90 [ 242.085062][T21075] should_failslab+0x5/0x20 [ 242.089554][T21075] kmem_cache_alloc+0x46/0x2f0 [ 242.094399][T21075] ? __vma_link_rb+0x3c2/0x3e0 [ 242.099163][T21075] ? anon_vma_fork+0x72/0x2b0 [ 242.103841][T21075] dup_mmap+0x38e/0x9c0 [ 242.108023][T21075] dup_mm+0x7c/0x210 [ 242.111909][T21075] copy_process+0x1203/0x2e00 [ 242.114335][T21086] SELinux: duplicate or incompatible mount options 19:55:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x48000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 242.116574][T21075] kernel_clone+0x14b/0x680 [ 242.116596][T21075] __se_sys_clone3+0x194/0x1d0 [ 242.132376][T21075] ? ksys_write+0x148/0x180 [ 242.136880][T21075] ? fpregs_assert_state_consistent+0x7d/0x90 [ 242.142997][T21075] ? exit_to_user_mode_prepare+0x65/0x190 [ 242.148755][T21075] __x64_sys_clone3+0x2d/0x40 [ 242.153499][T21075] do_syscall_64+0x4a/0x90 [ 242.157929][T21075] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 242.163969][T21075] RIP: 0033:0x4665d9 [ 242.167844][T21075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 242.187601][T21075] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 242.196173][T21075] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 242.204124][T21075] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 242.212086][T21075] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 242.220088][T21075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 242.228063][T21075] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 242.284534][T21047] loop1: detected capacity change from 0 to 264192 [ 242.310993][T21047] loop1: p1[EZD] p3 [ 242.315078][T21047] loop1: p1 size 11290111 extends beyond EOD, truncated [ 242.322623][T21047] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:02 executing program 1: syz_read_part_table(0xeffdffffffffffff, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x4c000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:02 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x4000000, 0xac141409}}, 0x1c) 19:55:02 executing program 3 (fault-call:3 fault-nth:68): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) [ 242.425507][T21110] FAULT_INJECTION: forcing a failure. [ 242.425507][T21110] name failslab, interval 1, probability 0, space 0, times 0 [ 242.438241][T21110] CPU: 0 PID: 21110 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 242.442082][T21109] loop1: detected capacity change from 0 to 264192 [ 242.446996][T21110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.447010][T21110] Call Trace: [ 242.447017][T21110] dump_stack+0x137/0x19d [ 242.471195][T21110] should_fail+0x23c/0x250 [ 242.475693][T21110] ? dup_mmap+0x38e/0x9c0 [ 242.476169][T21111] SELinux: duplicate or incompatible mount options [ 242.480020][T21110] __should_failslab+0x81/0x90 [ 242.480047][T21110] should_failslab+0x5/0x20 [ 242.480062][T21110] kmem_cache_alloc+0x46/0x2f0 [ 242.500744][T21110] ? anon_vma_fork+0x273/0x2b0 [ 242.505564][T21110] dup_mmap+0x38e/0x9c0 [ 242.509789][T21110] dup_mm+0x7c/0x210 [ 242.513664][T21110] copy_process+0x1203/0x2e00 [ 242.518333][T21110] kernel_clone+0x14b/0x680 [ 242.522821][T21110] __se_sys_clone3+0x194/0x1d0 [ 242.527663][T21110] ? ksys_write+0x148/0x180 [ 242.532162][T21110] ? fpregs_assert_state_consistent+0x7d/0x90 [ 242.538270][T21110] ? exit_to_user_mode_prepare+0x65/0x190 [ 242.543974][T21110] __x64_sys_clone3+0x2d/0x40 [ 242.548631][T21110] do_syscall_64+0x4a/0x90 [ 242.553113][T21110] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 242.559058][T21110] RIP: 0033:0x4665d9 [ 242.562937][T21110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 242.582650][T21110] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 242.591137][T21110] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 242.599099][T21110] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 242.607099][T21110] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 242.615050][T21110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 242.622999][T21110] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 242.664484][T21109] loop1: p1[EZD] p3 [ 242.668626][T21109] loop1: p1 size 11290111 extends beyond EOD, truncated [ 242.677477][T21109] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:04 executing program 2: memfd_create(0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setregid(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000280)={[0x1]}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000280), 0x8b000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008f80), &(0x7f0000008fc0)=0xc) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000018c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002500)=[{&(0x7f0000000300)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000740)="17", 0x1}, {0x0}], 0x2, 0x0, 0x0, 0x8001}, {&(0x7f0000000d00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000e00)=[{0x0}], 0x1, &(0x7f00000003c0)=[@cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x18}}], 0x30, 0x800}], 0x2, 0x20004001) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB="023034e6342141a36ce746a360dc4cde4aa8b286beb5c30a87c7185d10dc644f0b7a7221d73ed03bcd7046f9dea57e52fea07b440eb8cb4bd8fde6b99f9eb8745eee0d40c64ddb97e09114d0467e996158ff2818dd80881236567e1209f57d310a3378935926"]) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), &(0x7f0000001280)=ANY=[@ANYBLOB], 0x638, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000380)={0x6, 0xfb, 0xe01, 0x4, 0x0, "b145e3180bb48426b58ee26ae64909d4", "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"}, 0xc001, 0x0) 19:55:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x60000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:04 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:55:04 executing program 3 (fault-call:3 fault-nth:69): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:04 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x5000000, 0xac141409}}, 0x1c) 19:55:04 executing program 1: syz_read_part_table(0xf6ffffff00000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:04 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x6000000, 0xac141409}}, 0x1c) 19:55:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x68000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 244.726092][T21132] SELinux: duplicate or incompatible mount options [ 244.777319][T21143] loop1: detected capacity change from 0 to 264192 [ 244.791993][T21144] FAULT_INJECTION: forcing a failure. [ 244.791993][T21144] name failslab, interval 1, probability 0, space 0, times 0 [ 244.798678][T21149] loop2: detected capacity change from 0 to 512 [ 244.804651][T21144] CPU: 0 PID: 21144 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 244.804675][T21144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.804686][T21144] Call Trace: [ 244.804693][T21144] dump_stack+0x137/0x19d [ 244.814230][T21153] SELinux: duplicate or incompatible mount options [ 244.819648][T21144] should_fail+0x23c/0x250 [ 244.819676][T21144] ? dup_mmap+0x38e/0x9c0 [ 244.830945][T21149] EXT4-fs (loop2): Unrecognized mount option "04æ4!A£lçF£`ÜLÞJ¨²†¾µÃ [ 244.830945][T21149] ‡Ç]ÜdO zr!×>Ð;ÍpFùÞ¥~Rþ {D¸ËKØý湟ž¸t^î@ÆMÛ—à‘ÐF~™aXÿ(Ý€ˆ6V~ õ}1 [ 244.830945][T21149] 3x“Y&" or missing value 19:55:04 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:55:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x6c000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 244.833107][T21144] __should_failslab+0x81/0x90 [ 244.833142][T21144] should_failslab+0x5/0x20 [ 244.833155][T21144] kmem_cache_alloc+0x46/0x2f0 [ 244.833172][T21144] ? anon_vma_fork+0x273/0x2b0 [ 244.893060][T21144] dup_mmap+0x38e/0x9c0 [ 244.896676][T21163] SELinux: duplicate or incompatible mount options [ 244.897298][T21144] dup_mm+0x7c/0x210 [ 244.907753][T21144] copy_process+0x1203/0x2e00 [ 244.912525][T21144] kernel_clone+0x14b/0x680 [ 244.917025][T21144] __se_sys_clone3+0x194/0x1d0 [ 244.921825][T21144] ? ksys_write+0x148/0x180 19:55:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x74000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x7a000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 244.926433][T21144] ? fpregs_assert_state_consistent+0x7d/0x90 [ 244.932682][T21144] ? exit_to_user_mode_prepare+0x65/0x190 [ 244.938428][T21144] __x64_sys_clone3+0x2d/0x40 [ 244.943111][T21144] do_syscall_64+0x4a/0x90 [ 244.945218][T21166] SELinux: duplicate or incompatible mount options [ 244.947550][T21144] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 244.960104][T21144] RIP: 0033:0x4665d9 [ 244.963990][T21144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 244.983610][T21144] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 244.988255][T21169] SELinux: duplicate or incompatible mount options [ 244.992023][T21144] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 244.992040][T21144] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 244.992051][T21144] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 244.992062][T21144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 244.992075][T21144] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 245.054235][T21143] loop1: p1[EZD] p3 [ 245.058313][T21143] loop1: p1 size 11290111 extends beyond EOD, truncated [ 245.069773][T21143] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:05 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffffffffffd7c) 19:55:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x8cffffff, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:55:05 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x7000000, 0xac141409}}, 0x1c) 19:55:05 executing program 3 (fault-call:3 fault-nth:70): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:05 executing program 1: syz_read_part_table(0xfcfdffff00000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 245.077923][T21162] loop2: detected capacity change from 0 to 512 [ 245.092233][T21162] EXT4-fs (loop2): Unrecognized mount option "04æ4!A£lçF£`ÜLÞJ¨²†¾µÃ [ 245.092233][T21162] ‡Ç]ÜdO zr!×>Ð;ÍpFùÞ¥~Rþ {D¸ËKØý湟ž¸t^î@ÆMÛ—à‘ÐF~™aXÿ(Ý€ˆ6V~ õ}1 [ 245.092233][T21162] 3x“Y&" or missing value [ 245.147156][T21187] FAULT_INJECTION: forcing a failure. [ 245.147156][T21187] name failslab, interval 1, probability 0, space 0, times 0 [ 245.159939][T21187] CPU: 0 PID: 21187 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 245.168705][T21187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.178866][T21187] Call Trace: [ 245.182145][T21187] dump_stack+0x137/0x19d [ 245.186544][T21187] should_fail+0x23c/0x250 [ 245.191072][T21187] ? anon_vma_clone+0x8d/0x380 19:55:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xc0ed0000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 245.195891][T21187] __should_failslab+0x81/0x90 [ 245.200929][T21187] should_failslab+0x5/0x20 [ 245.205433][T21187] kmem_cache_alloc+0x46/0x2f0 [ 245.210270][T21187] ? avc_has_perm_noaudit+0x19a/0x240 [ 245.215930][T21187] anon_vma_clone+0x8d/0x380 [ 245.220520][T21187] anon_vma_fork+0x54/0x2b0 [ 245.222551][T21199] loop1: detected capacity change from 0 to 264192 [ 245.225048][T21187] dup_mmap+0x49c/0x9c0 [ 245.225068][T21187] dup_mm+0x7c/0x210 [ 245.225084][T21187] copy_process+0x1203/0x2e00 [ 245.244220][T21187] kernel_clone+0x14b/0x680 [ 245.248726][T21187] __se_sys_clone3+0x194/0x1d0 [ 245.253493][T21187] ? ksys_write+0x148/0x180 [ 245.257991][T21187] ? fpregs_assert_state_consistent+0x7d/0x90 [ 245.264068][T21187] ? exit_to_user_mode_prepare+0x65/0x190 [ 245.269802][T21187] __x64_sys_clone3+0x2d/0x40 [ 245.271844][T21203] SELinux: duplicate or incompatible mount options [ 245.274528][T21187] do_syscall_64+0x4a/0x90 [ 245.285529][T21187] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 245.291426][T21187] RIP: 0033:0x4665d9 19:55:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xf6ffffff, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xfeffffff, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 245.295307][T21187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 245.314914][T21187] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 245.323319][T21187] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 245.331296][T21187] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 245.339274][T21187] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 19:55:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 245.347271][T21187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.355247][T21187] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:55:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xffffe000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:05 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x20}}, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2f6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x8, 0x0, 0x0, 0x401}]}, 0x10) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f00001e4000/0x1000)=nil, 0x1000, 0x3000008, 0x20010, r0, 0x25116000) sendto$inet6(r2, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f00000000c0)='\t', 0x1, 0x20042041, &(0x7f0000000080)={0xa, 0x4e29, 0x0, @local, 0x80000003}, 0x1c) poll(&(0x7f0000000000)=[{r2}], 0x1, 0x200) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 19:55:05 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x8000000, 0xac141409}}, 0x1c) 19:55:05 executing program 3 (fault-call:3 fault-nth:71): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 245.395296][T21199] loop1: p1[EZD] p3 [ 245.413989][T21199] loop1: p1 size 11290111 extends beyond EOD, truncated [ 245.434940][T21199] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xffffff8c, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:05 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xf000000, 0xac141409}}, 0x1c) 19:55:05 executing program 4 (fault-call:3 fault-nth:0): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 245.534344][T21238] FAULT_INJECTION: forcing a failure. [ 245.534344][T21238] name failslab, interval 1, probability 0, space 0, times 0 [ 245.547088][T21238] CPU: 0 PID: 21238 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 245.555064][T21244] FAULT_INJECTION: forcing a failure. [ 245.555064][T21244] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 245.555894][T21238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.555907][T21238] Call Trace: [ 245.555914][T21238] dump_stack+0x137/0x19d [ 245.586541][T21238] should_fail+0x23c/0x250 [ 245.590946][T21238] ? anon_vma_fork+0xb1/0x2b0 [ 245.595723][T21238] __should_failslab+0x81/0x90 [ 245.600530][T21238] should_failslab+0x5/0x20 [ 245.605023][T21238] kmem_cache_alloc+0x46/0x2f0 [ 245.609782][T21238] anon_vma_fork+0xb1/0x2b0 [ 245.614326][T21238] dup_mmap+0x49c/0x9c0 [ 245.618464][T21238] dup_mm+0x7c/0x210 [ 245.622400][T21238] copy_process+0x1203/0x2e00 [ 245.627162][T21238] kernel_clone+0x14b/0x680 [ 245.631683][T21238] __se_sys_clone3+0x194/0x1d0 [ 245.636446][T21238] ? ksys_write+0x148/0x180 [ 245.640936][T21238] ? fpregs_assert_state_consistent+0x7d/0x90 [ 245.647041][T21238] ? exit_to_user_mode_prepare+0x65/0x190 [ 245.652742][T21238] __x64_sys_clone3+0x2d/0x40 [ 245.657406][T21238] do_syscall_64+0x4a/0x90 [ 245.661874][T21238] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 245.667758][T21238] RIP: 0033:0x4665d9 [ 245.671630][T21238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 245.691215][T21238] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 245.699613][T21238] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 245.707653][T21238] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 245.715619][T21238] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 245.723570][T21238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.731576][T21238] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 245.739530][T21244] CPU: 1 PID: 21244 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 245.748292][T21244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.758343][T21244] Call Trace: [ 245.761621][T21244] dump_stack+0x137/0x19d [ 245.766053][T21244] should_fail+0x23c/0x250 [ 245.770540][T21244] should_fail_usercopy+0x16/0x20 [ 245.775576][T21244] _copy_from_user+0x1c/0xd0 [ 245.780171][T21244] __sys_sendto+0x1af/0x370 [ 245.784666][T21244] ? __fget_light+0x21b/0x260 [ 245.789485][T21244] ? __cond_resched+0x11/0x40 [ 245.794291][T21244] ? fput+0x2d/0x130 [ 245.798318][T21244] __x64_sys_sendto+0x74/0x90 [ 245.802992][T21244] do_syscall_64+0x4a/0x90 [ 245.807412][T21244] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 245.813312][T21244] RIP: 0033:0x4665d9 [ 245.817701][T21244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 245.836361][T21251] FAULT_INJECTION: forcing a failure. [ 245.836361][T21251] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 245.838446][T21244] RSP: 002b:00007f1711f79188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 245.860118][T21244] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 245.868081][T21244] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 245.876046][T21244] RBP: 00007f1711f791d0 R08: 00000000200000c0 R09: 000000000000001c 19:55:05 executing program 1: syz_read_part_table(0xfdfdffff00000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xfffffff6, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:05 executing program 3 (fault-call:3 fault-nth:72): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xfffffffe, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 245.884086][T21244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.892123][T21244] R13: 00007ffee020149f R14: 00007f1711f79300 R15: 0000000000022000 [ 245.900262][T21251] CPU: 0 PID: 21251 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 245.909036][T21251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.919089][T21251] Call Trace: [ 245.922714][T21251] dump_stack+0x137/0x19d [ 245.927398][T21251] should_fail+0x23c/0x250 19:55:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x8000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 245.931814][T21251] __alloc_pages+0x102/0x320 [ 245.936405][T21251] alloc_pages+0x21d/0x310 [ 245.940827][T21251] pte_alloc_one+0x29/0xb0 [ 245.945237][T21251] __pte_alloc+0x2f/0x210 [ 245.949572][T21251] copy_pte_range+0x128e/0x1460 [ 245.954607][T21251] ? __alloc_pages+0x194/0x320 [ 245.959362][T21251] ? vma_interval_tree_augment_rotate+0x100/0x100 [ 245.965777][T21251] copy_page_range+0x5da/0x8e0 [ 245.970549][T21251] ? anon_vma_fork+0x273/0x2b0 [ 245.975312][T21251] dup_mmap+0x6ab/0x9c0 [ 245.979466][T21251] dup_mm+0x7c/0x210 [ 245.983361][T21251] copy_process+0x1203/0x2e00 [ 245.988038][T21251] kernel_clone+0x14b/0x680 [ 245.992540][T21251] __se_sys_clone3+0x194/0x1d0 [ 245.997303][T21251] ? ksys_write+0x148/0x180 [ 246.001805][T21251] ? fpregs_assert_state_consistent+0x7d/0x90 [ 246.006564][T21263] loop1: detected capacity change from 0 to 264192 [ 246.007874][T21251] ? exit_to_user_mode_prepare+0x65/0x190 [ 246.007900][T21251] __x64_sys_clone3+0x2d/0x40 [ 246.024828][T21251] do_syscall_64+0x4a/0x90 [ 246.029250][T21251] entry_SYSCALL_64_after_hwframe+0x44/0xae 19:55:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xedc000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 246.035229][T21251] RIP: 0033:0x4665d9 [ 246.039116][T21251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 246.058719][T21251] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 246.067129][T21251] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 246.075103][T21251] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 19:55:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xe0ffff00000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:06 executing program 4 (fault-call:3 fault-nth:1): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:06 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x10000000, 0xac141409}}, 0x1c) [ 246.083059][T21251] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 246.091024][T21251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 246.098975][T21251] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:55:06 executing program 3 (fault-call:3 fault-nth:73): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0x2, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0, 0x0, &(0x7f0000000940)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x28}}], 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x2c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000004c0)={'sit0\x00', &(0x7f0000000440)={'syztnl2\x00', 0x0, 0x29, 0x7, 0xf7, 0x7f, 0x1, @remote, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x7807, 0x1, 0x1}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000040)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)={0x544, 0x0, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@ETHTOOL_A_DEBUG_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_DEBUG_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}, @ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x48c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xb9, 0x5, "745a944a29ff222f21a8254c86b3fb54dae2b55a97c01467c21b1372ae44c4f2e20477f2ce958da9fc168bb215961a9c418a506f61cb9a332174f9e75d260105a12c8f97ec6ac92e98a32cef3121cefdd622d3d754ce67b2884b8f04679a0a0ec1acf8ee324b9eba9f99dc40943eaf1fc7dba01b72920d16b33515c9b7429f401bb2126a771ee83eca7af388fc7ac7cf00c370ca9ee757e1982ff5293be6729dfe5d14b1ebf26d37b148eaa1c42c3b6b20a3c21869"}, @ETHTOOL_A_BITSET_BITS={0x17c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3800000}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\'-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, ' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '@)\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x96b}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x276}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '&(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, ' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x100, 0x3, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf45a}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ')\'/#\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '*'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, ' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}^\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xb0, 0x3, 0x0, 0x1, [{0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, ']]-$}%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x18, 0x2, '2-![[-[-,#+$\\$\xd8}.))\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '{$/{)\x9a+&-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3436}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, ' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7}, @ETHTOOL_A_BITSET_BITS={0x88, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff5011}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '%-)\\@\'\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, ')\xf0#![$\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '^\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '!:\\\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0xa, 0x4, "f78464774b95"}]}, @ETHTOOL_A_DEBUG_HEADER={0x4}]}, 0x544}, 0x1, 0x0, 0x0, 0x20000800}, 0x5) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000040)={0x2c, r9, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}]}, 0x2c}}, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000001c0)=[{&(0x7f00000000c0)="f5bb821e145d86937711236c1fd522f2245a1c9d3caa45d92c4bfbca50ec027f8b22f6691f3827da8256a3d75b33b58eb7879c72f5c6603a431b3014ae6d5b4ee96715a6e3a6b1744b33b280562471392791b1255b343e4e36e98414116c5497ed53c77ce9aea155d799f8e80c81b27d837c18", 0x73}, {&(0x7f0000000140)="8471ad629afd2ff3f0a1c12196761204ee27df5893cda60c92569db8350a7d19d2fd51bf6d273e55353acba176699c47f17b3d837e7249ffbc9c2789eab71d696be6838a343f76", 0x47}], 0x2, &(0x7f0000000200)=[@ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xf1d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x40}}, @ip_retopts={{0x24, 0x0, 0x7, {[@generic={0x83, 0xd, "c3fde8a20c302dd7396569"}, @noop, @noop, @generic={0x89, 0x3, "c7"}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @multicast2}}}], 0xe0}, 0x8000000) [ 246.145830][T21263] loop1: p1[EZD] p3 [ 246.155411][T21263] loop1: p1 size 11290111 extends beyond EOD, truncated [ 246.193458][T21263] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 246.202377][T21284] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 246.211271][T21284] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 246.221274][T21285] FAULT_INJECTION: forcing a failure. [ 246.221274][T21285] name failslab, interval 1, probability 0, space 0, times 0 [ 246.233901][T21285] CPU: 0 PID: 21285 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 246.242667][T21285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.247798][T21286] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 246.252725][T21285] Call Trace: [ 246.252735][T21285] dump_stack+0x137/0x19d [ 246.252759][T21285] should_fail+0x23c/0x250 [ 246.261877][T21286] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 246.264080][T21285] __should_failslab+0x81/0x90 [ 246.281186][T21292] FAULT_INJECTION: forcing a failure. [ 246.281186][T21292] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 246.285588][T21285] should_failslab+0x5/0x20 [ 246.285609][T21285] kmem_cache_alloc_node+0x58/0x2b0 [ 246.308460][T21285] ? fib6_table_lookup+0x21b/0x5e0 [ 246.313677][T21285] ? __alloc_skb+0xed/0x420 [ 246.318256][T21285] ? fib6_table_lookup+0x530/0x5e0 [ 246.323503][T21285] __alloc_skb+0xed/0x420 [ 246.327823][T21285] __ip6_append_data+0x17c2/0x21a0 [ 246.333223][T21285] ? ipv6_dev_get_saddr+0x256/0x280 [ 246.338509][T21285] ? xfrm_lookup_with_ifid+0xb7a/0x15b0 [ 246.344054][T21285] ? ip6_setup_cork+0x826/0x8b0 [ 246.348993][T21285] ip6_append_data+0x17e/0x230 [ 246.353915][T21285] ? rawv6_send_hdrinc+0x8d0/0x8d0 [ 246.359207][T21285] ? rawv6_send_hdrinc+0x8d0/0x8d0 [ 246.364303][T21285] rawv6_sendmsg+0xe2a/0x1330 [ 246.368965][T21285] ? __alloc_pages+0x194/0x320 [ 246.373797][T21285] ? kstrtoull+0x30e/0x350 [ 246.378233][T21285] inet_sendmsg+0x5f/0x80 [ 246.382652][T21285] __sys_sendto+0x2a8/0x370 [ 246.387267][T21285] ? __cond_resched+0x11/0x40 [ 246.391927][T21285] ? fput+0x2d/0x130 [ 246.395890][T21285] __x64_sys_sendto+0x74/0x90 [ 246.400634][T21285] do_syscall_64+0x4a/0x90 [ 246.405121][T21285] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 246.411050][T21285] RIP: 0033:0x4665d9 [ 246.414923][T21285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 246.434770][T21285] RSP: 002b:00007f1711f79188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 246.443162][T21285] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 246.451115][T21285] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 246.459082][T21285] RBP: 00007f1711f791d0 R08: 00000000200000c0 R09: 000000000000001c [ 246.467184][T21285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 246.475149][T21285] R13: 00007ffee020149f R14: 00007f1711f79300 R15: 0000000000022000 [ 246.483294][T21292] CPU: 1 PID: 21292 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 19:55:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x100000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 246.492148][T21292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.502730][T21292] Call Trace: [ 246.506098][T21292] dump_stack+0x137/0x19d [ 246.510525][T21292] should_fail+0x23c/0x250 [ 246.515029][T21292] __alloc_pages+0x102/0x320 [ 246.519621][T21292] alloc_pages+0x21d/0x310 [ 246.524038][T21292] get_zeroed_page+0x13/0x40 [ 246.528983][T21292] __pud_alloc+0x44/0x190 [ 246.533409][T21292] copy_page_range+0x73a/0x8e0 [ 246.538177][T21292] ? vma_interval_tree_augment_rotate+0x100/0x100 [ 246.544597][T21292] ? __do_sys_brk+0x580/0x580 [ 246.549262][T21292] ? anon_vma_fork+0x273/0x2b0 [ 246.554009][T21292] dup_mmap+0x6ab/0x9c0 [ 246.558168][T21292] dup_mm+0x7c/0x210 [ 246.562062][T21292] copy_process+0x1203/0x2e00 [ 246.566734][T21292] kernel_clone+0x14b/0x680 [ 246.571239][T21292] __se_sys_clone3+0x194/0x1d0 [ 246.575991][T21292] ? ksys_write+0x148/0x180 [ 246.580595][T21292] ? fpregs_assert_state_consistent+0x7d/0x90 [ 246.586648][T21292] ? exit_to_user_mode_prepare+0x65/0x190 [ 246.592370][T21292] __x64_sys_clone3+0x2d/0x40 [ 246.597067][T21292] do_syscall_64+0x4a/0x90 [ 246.601472][T21292] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 246.607364][T21292] RIP: 0033:0x4665d9 [ 246.611238][T21292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 246.630911][T21292] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 246.639395][T21292] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 246.648493][T21292] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 246.656556][T21292] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 246.664510][T21292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 246.672481][T21292] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 246.707206][T21273] blk_update_request: I/O error, dev loop1, sector 264033 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 246.721747][T21263] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 246.728098][T21267] blk_update_request: I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 246.756521][ T702] blk_update_request: I/O error, dev loop1, sector 264033 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 246.766612][T21263] loop1: detected capacity change from 0 to 264192 [ 246.768083][ T702] Buffer I/O error on dev loop1p3, logical block 263808, async page read 19:55:06 executing program 3 (fault-call:3 fault-nth:74): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x200000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:06 executing program 1: syz_read_part_table(0xfeffffff00000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:06 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x10000120, 0xac141409}}, 0x1c) 19:55:06 executing program 4 (fault-call:3 fault-nth:2): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:06 executing program 2: prlimit64(0xffffffffffffffff, 0xa, &(0x7f0000000280)={0x8e7, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x1) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x96}, 0x1c) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x5412, &(0x7f00000000c0)=0x13) r3 = dup(r2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) mq_timedsend(r3, 0x0, 0x0, 0x3ff, &(0x7f0000000000)={0x77359400}) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000080)=ANY=[], 0x8) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x5412, &(0x7f00000000c0)=0x13) r5 = dup(r4) ioctl$TCSETAF(r5, 0x5408, 0x0) [ 246.820463][T21263] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 246.855147][T21318] FAULT_INJECTION: forcing a failure. [ 246.855147][T21318] name failslab, interval 1, probability 0, space 0, times 0 [ 246.862587][T21317] FAULT_INJECTION: forcing a failure. [ 246.862587][T21317] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 246.867899][T21318] CPU: 1 PID: 21318 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 246.889901][T21318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.900121][T21318] Call Trace: [ 246.903389][T21318] dump_stack+0x137/0x19d [ 246.907706][T21318] should_fail+0x23c/0x250 [ 246.912127][T21318] __should_failslab+0x81/0x90 [ 246.916925][T21318] should_failslab+0x5/0x20 [ 246.921584][T21318] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 246.927753][T21318] ? __kmalloc_node_track_caller+0x30/0x40 [ 246.933753][T21318] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 246.939196][T21318] __kmalloc_node_track_caller+0x30/0x40 [ 246.945088][T21318] ? __ip6_append_data+0x17c2/0x21a0 [ 246.950360][T21318] __alloc_skb+0x187/0x420 [ 246.954782][T21318] __ip6_append_data+0x17c2/0x21a0 [ 246.959951][T21318] ? ipv6_dev_get_saddr+0x256/0x280 [ 246.965315][T21318] ? xfrm_lookup_with_ifid+0xb7a/0x15b0 [ 246.970953][T21318] ? ip6_setup_cork+0x826/0x8b0 [ 246.975892][T21318] ip6_append_data+0x17e/0x230 [ 246.980683][T21318] ? rawv6_send_hdrinc+0x8d0/0x8d0 [ 246.985840][T21318] ? rawv6_send_hdrinc+0x8d0/0x8d0 [ 246.990941][T21318] rawv6_sendmsg+0xe2a/0x1330 [ 246.995602][T21318] ? __alloc_pages+0x194/0x320 [ 247.000347][T21318] ? kstrtoull+0x30e/0x350 [ 247.004752][T21318] inet_sendmsg+0x5f/0x80 [ 247.009067][T21318] __sys_sendto+0x2a8/0x370 [ 247.013639][T21318] ? __cond_resched+0x11/0x40 [ 247.018303][T21318] ? fput+0x2d/0x130 [ 247.022721][T21318] __x64_sys_sendto+0x74/0x90 [ 247.027475][T21318] do_syscall_64+0x4a/0x90 [ 247.031875][T21318] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 247.037889][T21318] RIP: 0033:0x4665d9 [ 247.041924][T21318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 247.061550][T21318] RSP: 002b:00007f1711f79188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 247.069965][T21318] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 247.077929][T21318] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 247.085883][T21318] RBP: 00007f1711f791d0 R08: 00000000200000c0 R09: 000000000000001c [ 247.093845][T21318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 247.101798][T21318] R13: 00007ffee020149f R14: 00007f1711f79300 R15: 0000000000022000 [ 247.109755][T21317] CPU: 0 PID: 21317 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 19:55:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x300000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 247.118526][T21317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.128838][T21317] Call Trace: [ 247.132114][T21317] dump_stack+0x137/0x19d [ 247.135733][ T1033] loop1: p1[EZD] p3 [ 247.136534][T21317] should_fail+0x23c/0x250 [ 247.144541][ T1033] loop1: p1 size 11290111 extends beyond EOD, truncated [ 247.144816][T21317] __alloc_pages+0x102/0x320 [ 247.153711][ T1033] loop1: p3 size 1912633224 extends beyond EOD, [ 247.156323][T21317] alloc_pages+0x21d/0x310 [ 247.156336][ T1033] truncated 19:55:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x400000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:07 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x10080000, 0xac141409}}, 0x1c) 19:55:07 executing program 4 (fault-call:3 fault-nth:3): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:07 executing program 3 (fault-call:3 fault-nth:75): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 247.156347][T21317] pte_alloc_one+0x29/0xb0 [ 247.174655][T21317] __pte_alloc+0x2f/0x210 [ 247.174688][T21317] copy_pte_range+0x128e/0x1460 19:55:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x500000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 247.174709][T21317] ? get_page_from_freelist+0x53e/0x800 [ 247.174727][T21317] ? vma_interval_tree_augment_rotate+0x100/0x100 [ 247.174749][T21317] copy_page_range+0x5da/0x8e0 [ 247.174770][T21317] ? anon_vma_fork+0x273/0x2b0 19:55:07 executing program 4 (fault-call:3 fault-nth:4): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x600000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 247.174790][T21317] dup_mmap+0x6ab/0x9c0 [ 247.174805][T21317] dup_mm+0x7c/0x210 [ 247.174819][T21317] copy_process+0x1203/0x2e00 [ 247.174835][T21317] kernel_clone+0x14b/0x680 [ 247.174851][T21317] __se_sys_clone3+0x194/0x1d0 [ 247.174866][T21317] ? ksys_write+0x148/0x180 [ 247.174880][T21317] ? fpregs_assert_state_consistent+0x7d/0x90 [ 247.174904][T21317] ? exit_to_user_mode_prepare+0x65/0x190 [ 247.174925][T21317] __x64_sys_clone3+0x2d/0x40 [ 247.174947][T21317] do_syscall_64+0x4a/0x90 [ 247.174969][T21317] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 247.174992][T21317] RIP: 0033:0x4665d9 [ 247.175004][T21317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 247.175018][T21317] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 247.175032][T21317] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 247.175042][T21317] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 247.175054][T21317] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 247.175067][T21317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 247.175077][T21317] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 247.248784][T21345] FAULT_INJECTION: forcing a failure. [ 247.248784][T21345] name failslab, interval 1, probability 0, space 0, times 0 [ 247.248875][T21345] CPU: 0 PID: 21345 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 247.248891][T21345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.248900][T21345] Call Trace: [ 247.248958][T21345] dump_stack+0x137/0x19d [ 247.248979][T21345] should_fail+0x23c/0x250 [ 247.249000][T21345] ? skb_clone+0x12c/0x1f0 [ 247.249017][T21345] __should_failslab+0x81/0x90 [ 247.249042][T21345] should_failslab+0x5/0x20 [ 247.249059][T21345] kmem_cache_alloc+0x46/0x2f0 [ 247.249153][T21345] skb_clone+0x12c/0x1f0 [ 247.249167][T21345] dev_queue_xmit_nit+0x145/0x5f0 [ 247.249188][T21345] xmit_one+0x71/0x270 [ 247.249206][T21345] __dev_queue_xmit+0xcda/0x12a0 [ 247.249226][T21345] dev_queue_xmit+0x13/0x20 [ 247.249241][T21345] neigh_connected_output+0x264/0x290 [ 247.249260][T21345] ip6_finish_output2+0x8f5/0xa80 [ 247.249314][T21345] ip6_finish_output+0x428/0x480 [ 247.249335][T21345] ip6_output+0x10e/0x210 [ 247.249352][T21345] ? ip6_output+0x210/0x210 [ 247.249365][T21345] ip6_local_out+0x124/0x1e0 [ 247.249382][T21345] ? __ip6_local_out+0x1a0/0x1a0 [ 247.249443][T21345] ip6_push_pending_frames+0xb6/0x170 [ 247.249464][T21345] rawv6_sendmsg+0x1287/0x1330 [ 247.249485][T21345] ? __alloc_pages+0x194/0x320 [ 247.249499][T21345] ? kstrtoull+0x30e/0x350 [ 247.249518][T21345] inet_sendmsg+0x5f/0x80 [ 247.249580][T21345] __sys_sendto+0x2a8/0x370 [ 247.249596][T21345] ? __cond_resched+0x11/0x40 [ 247.249612][T21345] ? fput+0x2d/0x130 [ 247.249627][T21345] __x64_sys_sendto+0x74/0x90 [ 247.249640][T21345] do_syscall_64+0x4a/0x90 [ 247.249658][T21345] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 247.249727][T21345] RIP: 0033:0x4665d9 [ 247.249738][T21345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 247.249752][T21345] RSP: 002b:00007f1711f79188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 247.249766][T21345] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 247.249776][T21345] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 247.249857][T21345] RBP: 00007f1711f791d0 R08: 00000000200000c0 R09: 000000000000001c [ 247.249868][T21345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 247.249877][T21345] R13: 00007ffee020149f R14: 00007f1711f79300 R15: 0000000000022000 [ 247.264271][T21343] FAULT_INJECTION: forcing a failure. [ 247.264271][T21343] name failslab, interval 1, probability 0, space 0, times 0 [ 247.309748][T21355] loop1: detected capacity change from 0 to 264192 [ 247.310561][T21343] CPU: 1 PID: 21343 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 247.324145][T21363] FAULT_INJECTION: forcing a failure. [ 247.324145][T21363] name failslab, interval 1, probability 0, space 0, times 0 [ 247.325479][T21343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.325492][T21343] Call Trace: [ 247.325499][T21343] dump_stack+0x137/0x19d [ 247.699386][T21343] should_fail+0x23c/0x250 [ 247.703824][T21343] ? anon_vma_clone+0x8d/0x380 [ 247.708673][T21343] __should_failslab+0x81/0x90 [ 247.713423][T21343] should_failslab+0x5/0x20 [ 247.717975][T21343] kmem_cache_alloc+0x46/0x2f0 [ 247.722910][T21343] ? avc_has_perm_noaudit+0x19a/0x240 [ 247.728263][T21343] anon_vma_clone+0x8d/0x380 [ 247.732919][T21343] anon_vma_fork+0x54/0x2b0 [ 247.737403][T21343] dup_mmap+0x49c/0x9c0 [ 247.741550][T21343] dup_mm+0x7c/0x210 [ 247.745453][T21343] copy_process+0x1203/0x2e00 [ 247.750110][T21343] kernel_clone+0x14b/0x680 [ 247.754592][T21343] __se_sys_clone3+0x194/0x1d0 [ 247.759347][T21343] ? ksys_write+0x148/0x180 [ 247.763832][T21343] ? fpregs_assert_state_consistent+0x7d/0x90 [ 247.769895][T21343] ? exit_to_user_mode_prepare+0x65/0x190 [ 247.775610][T21343] __x64_sys_clone3+0x2d/0x40 [ 247.780271][T21343] do_syscall_64+0x4a/0x90 [ 247.784722][T21343] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 247.790680][T21343] RIP: 0033:0x4665d9 [ 247.794661][T21343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 247.814290][T21343] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 247.822714][T21343] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 247.830746][T21343] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 247.838698][T21343] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 247.846843][T21343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 247.854795][T21343] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 247.862749][T21363] CPU: 0 PID: 21363 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 247.871620][T21363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.881686][T21363] Call Trace: [ 247.884960][T21363] dump_stack+0x137/0x19d [ 247.889293][T21363] should_fail+0x23c/0x250 [ 247.893715][T21363] ? skb_clone+0x12c/0x1f0 [ 247.898140][T21363] __should_failslab+0x81/0x90 [ 247.902974][T21363] should_failslab+0x5/0x20 [ 247.907480][T21363] kmem_cache_alloc+0x46/0x2f0 [ 247.912241][T21363] skb_clone+0x12c/0x1f0 [ 247.916488][T21363] packet_rcv+0x3e6/0xa20 [ 247.920824][T21363] ? packet_sock_destruct+0xc0/0xc0 [ 247.920847][T21363] dev_queue_xmit_nit+0x382/0x5f0 [ 247.920867][T21363] xmit_one+0x71/0x270 [ 247.935107][T21363] __dev_queue_xmit+0xcda/0x12a0 [ 247.935131][T21363] dev_queue_xmit+0x13/0x20 [ 247.935145][T21363] neigh_connected_output+0x264/0x290 [ 247.951447][T21363] ip6_finish_output2+0x8f5/0xa80 [ 247.956485][T21363] ip6_finish_output+0x428/0x480 [ 247.961515][T21363] ip6_output+0x10e/0x210 [ 247.965865][T21363] ? ip6_output+0x210/0x210 [ 247.970465][T21363] ip6_local_out+0x124/0x1e0 [ 247.975320][T21363] ? __ip6_local_out+0x1a0/0x1a0 [ 247.980451][T21363] ip6_push_pending_frames+0xb6/0x170 [ 247.985811][T21363] rawv6_sendmsg+0x1287/0x1330 [ 247.990619][T21363] ? __alloc_pages+0x194/0x320 [ 247.995552][T21363] ? kstrtoull+0x30e/0x350 [ 248.000139][T21363] inet_sendmsg+0x5f/0x80 [ 248.004464][T21363] __sys_sendto+0x2a8/0x370 [ 248.009109][T21363] ? __cond_resched+0x11/0x40 [ 248.014054][T21363] ? fput+0x2d/0x130 [ 248.018154][T21363] __x64_sys_sendto+0x74/0x90 [ 248.022835][T21363] do_syscall_64+0x4a/0x90 [ 248.027254][T21363] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 248.033206][T21363] RIP: 0033:0x4665d9 [ 248.037080][T21363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 248.056673][T21363] RSP: 002b:00007f1711f79188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 248.065076][T21363] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 248.073043][T21363] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 248.080995][T21363] RBP: 00007f1711f791d0 R08: 00000000200000c0 R09: 000000000000001c [ 248.089063][T21363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.097524][T21363] R13: 00007ffee020149f R14: 00007f1711f79300 R15: 0000000000022000 [ 248.139754][T21367] loop1: p1[EZD] p3 [ 248.143731][T21367] loop1: p1 size 11290111 extends beyond EOD, truncated [ 248.151566][T21367] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 248.160211][T21355] loop1: p1[EZD] p3 [ 248.164233][T21355] loop1: p1 size 11290111 extends beyond EOD, truncated [ 248.171828][T21355] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:08 executing program 1: syz_read_part_table(0xfeffffffffffffff, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:08 executing program 3 (fault-call:3 fault-nth:76): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x700000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000103, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000040000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)=ANY=[@ANYBLOB='\x00']) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/kcm\x00') 19:55:08 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x11000000, 0xac141409}}, 0x1c) 19:55:08 executing program 4 (fault-call:3 fault-nth:5): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 248.290998][T21391] FAULT_INJECTION: forcing a failure. [ 248.290998][T21391] name failslab, interval 1, probability 0, space 0, times 0 [ 248.299145][T21395] FAULT_INJECTION: forcing a failure. [ 248.299145][T21395] name failslab, interval 1, probability 0, space 0, times 0 [ 248.303794][T21391] CPU: 0 PID: 21391 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 248.303815][T21391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.303825][T21391] Call Trace: [ 248.303832][T21391] dump_stack+0x137/0x19d [ 248.342854][T21391] should_fail+0x23c/0x250 [ 248.347368][T21391] ? skb_clone+0x12c/0x1f0 [ 248.351762][T21391] __should_failslab+0x81/0x90 [ 248.356510][T21391] should_failslab+0x5/0x20 [ 248.360991][T21391] kmem_cache_alloc+0x46/0x2f0 [ 248.365759][T21391] skb_clone+0x12c/0x1f0 [ 248.369979][T21391] packet_rcv+0x3e6/0xa20 [ 248.374400][T21391] ? packet_sock_destruct+0xc0/0xc0 [ 248.379663][T21391] dev_queue_xmit_nit+0x382/0x5f0 [ 248.384804][T21391] xmit_one+0x71/0x270 [ 248.388864][T21391] __dev_queue_xmit+0xcda/0x12a0 [ 248.394137][T21391] dev_queue_xmit+0x13/0x20 [ 248.398630][T21391] neigh_connected_output+0x264/0x290 [ 248.403982][T21391] ip6_finish_output2+0x8f5/0xa80 [ 248.408988][T21391] ip6_finish_output+0x428/0x480 [ 248.413980][T21391] ip6_output+0x10e/0x210 [ 248.418292][T21391] ? ip6_output+0x210/0x210 [ 248.422821][T21391] ip6_local_out+0x124/0x1e0 [ 248.427441][T21391] ? __ip6_local_out+0x1a0/0x1a0 [ 248.432405][T21391] ip6_push_pending_frames+0xb6/0x170 [ 248.437759][T21391] rawv6_sendmsg+0x1287/0x1330 [ 248.442553][T21391] ? __alloc_pages+0x194/0x320 [ 248.447307][T21391] ? kstrtoull+0x30e/0x350 [ 248.451713][T21391] inet_sendmsg+0x5f/0x80 [ 248.456052][T21391] __sys_sendto+0x2a8/0x370 [ 248.460535][T21391] ? __cond_resched+0x11/0x40 [ 248.465193][T21391] ? fput+0x2d/0x130 [ 248.469066][T21391] __x64_sys_sendto+0x74/0x90 [ 248.473777][T21391] do_syscall_64+0x4a/0x90 [ 248.478179][T21391] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 248.484068][T21391] RIP: 0033:0x4665d9 [ 248.487940][T21391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 248.507622][T21391] RSP: 002b:00007f1711f79188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 248.516095][T21391] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 248.524141][T21391] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 248.532121][T21391] RBP: 00007f1711f791d0 R08: 00000000200000c0 R09: 000000000000001c [ 248.540073][T21391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.548027][T21391] R13: 00007ffee020149f R14: 00007f1711f79300 R15: 0000000000022000 [ 248.555999][T21395] CPU: 1 PID: 21395 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 248.564763][T21395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.574297][T21394] loop1: detected capacity change from 0 to 264192 [ 248.574815][T21395] Call Trace: [ 248.574824][T21395] dump_stack+0x137/0x19d 19:55:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x800000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 248.588993][T21395] should_fail+0x23c/0x250 [ 248.593421][T21395] ? anon_vma_fork+0x117/0x2b0 [ 248.598184][T21395] __should_failslab+0x81/0x90 [ 248.603009][T21395] should_failslab+0x5/0x20 [ 248.607524][T21395] kmem_cache_alloc+0x46/0x2f0 [ 248.612293][T21395] ? anon_vma_fork+0xb1/0x2b0 [ 248.616966][T21395] anon_vma_fork+0x117/0x2b0 [ 248.621081][T21396] loop2: detected capacity change from 0 to 264192 [ 248.621599][T21395] dup_mmap+0x49c/0x9c0 [ 248.632304][T21395] dup_mm+0x7c/0x210 [ 248.636198][T21395] copy_process+0x1203/0x2e00 19:55:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x900000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 248.640873][T21395] kernel_clone+0x14b/0x680 [ 248.645373][T21395] __se_sys_clone3+0x194/0x1d0 [ 248.650219][T21395] ? ksys_write+0x148/0x180 [ 248.652633][T21396] EXT4-fs (loop2): inodes count not valid: 32 vs 2048 [ 248.654723][T21395] ? fpregs_assert_state_consistent+0x7d/0x90 [ 248.667666][T21395] ? exit_to_user_mode_prepare+0x65/0x190 [ 248.673587][T21395] __x64_sys_clone3+0x2d/0x40 [ 248.678264][T21395] do_syscall_64+0x4a/0x90 [ 248.682800][T21395] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 248.688738][T21395] RIP: 0033:0x4665d9 19:55:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xa00000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xb00000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 248.692636][T21395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 248.712248][T21395] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 248.720721][T21395] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 248.729093][T21395] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 19:55:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xc00000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:08 executing program 4 (fault-call:3 fault-nth:6): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 248.737287][T21395] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 248.745415][T21395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 248.753572][T21395] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 248.796951][T21394] loop1: p1[EZD] p3 [ 248.802547][T21394] loop1: p1 size 11290111 extends beyond EOD, truncated [ 248.810900][T21394] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 248.826562][T21400] loop2: detected capacity change from 0 to 264192 [ 248.826648][T21423] FAULT_INJECTION: forcing a failure. [ 248.826648][T21423] name failslab, interval 1, probability 0, space 0, times 0 19:55:08 executing program 1: syz_read_part_table(0xffffffff00000000, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:08 executing program 3 (fault-call:3 fault-nth:77): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:08 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x20010010, 0xac141409}}, 0x1c) [ 248.846600][T21423] CPU: 0 PID: 21423 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 248.851734][T21400] EXT4-fs (loop2): inodes count not valid: 32 vs 2048 [ 248.855473][T21423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.855487][T21423] Call Trace: [ 248.855494][T21423] dump_stack+0x137/0x19d [ 248.880069][T21423] should_fail+0x23c/0x250 [ 248.884548][T21423] ? skb_clone+0x12c/0x1f0 [ 248.888960][T21423] __should_failslab+0x81/0x90 [ 248.893729][T21423] should_failslab+0x5/0x20 [ 248.898270][T21423] kmem_cache_alloc+0x46/0x2f0 [ 248.903100][T21423] ? __skb_clone+0x2b9/0x2d0 [ 248.907707][T21423] skb_clone+0x12c/0x1f0 [ 248.912010][T21423] packet_rcv+0x3e6/0xa20 [ 248.916355][T21423] ? packet_sock_destruct+0xc0/0xc0 [ 248.916892][T21436] FAULT_INJECTION: forcing a failure. [ 248.916892][T21436] name failslab, interval 1, probability 0, space 0, times 0 [ 248.921594][T21423] dev_queue_xmit_nit+0x382/0x5f0 [ 248.921619][T21423] xmit_one+0x71/0x270 [ 248.921635][T21423] __dev_queue_xmit+0xcda/0x12a0 [ 248.948296][T21423] dev_queue_xmit+0x13/0x20 [ 248.952787][T21423] neigh_connected_output+0x264/0x290 [ 248.958143][T21423] ip6_finish_output2+0x8f5/0xa80 [ 248.963170][T21423] ip6_finish_output+0x428/0x480 [ 248.968093][T21423] ip6_output+0x10e/0x210 [ 248.972404][T21423] ? ip6_output+0x210/0x210 [ 248.976888][T21423] ip6_local_out+0x124/0x1e0 [ 248.981544][T21423] ? __ip6_local_out+0x1a0/0x1a0 [ 248.986485][T21423] ip6_push_pending_frames+0xb6/0x170 [ 248.991879][T21423] rawv6_sendmsg+0x1287/0x1330 [ 248.996811][T21423] ? __alloc_pages+0x194/0x320 [ 249.002142][T21423] ? kstrtoull+0x30e/0x350 [ 249.006543][T21423] inet_sendmsg+0x5f/0x80 [ 249.010863][T21423] __sys_sendto+0x2a8/0x370 [ 249.015674][T21423] ? __cond_resched+0x11/0x40 [ 249.020331][T21423] ? fput+0x2d/0x130 [ 249.024231][T21423] __x64_sys_sendto+0x74/0x90 [ 249.028889][T21423] do_syscall_64+0x4a/0x90 [ 249.033289][T21423] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 249.039234][T21423] RIP: 0033:0x4665d9 [ 249.043122][T21423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 249.062891][T21423] RSP: 002b:00007f1711f79188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 249.071380][T21423] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 249.079337][T21423] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 249.087387][T21423] RBP: 00007f1711f791d0 R08: 00000000200000c0 R09: 000000000000001c [ 249.095470][T21423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 249.103459][T21423] R13: 00007ffee020149f R14: 00007f1711f79300 R15: 0000000000022000 [ 249.111503][T21436] CPU: 1 PID: 21436 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 249.120339][T21436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.130390][T21436] Call Trace: [ 249.133691][T21436] dump_stack+0x137/0x19d [ 249.138066][T21436] should_fail+0x23c/0x250 [ 249.142480][T21436] ? dup_mmap+0x38e/0x9c0 [ 249.146793][T21436] __should_failslab+0x81/0x90 [ 249.151820][T21436] should_failslab+0x5/0x20 [ 249.156310][T21436] kmem_cache_alloc+0x46/0x2f0 [ 249.161056][T21436] ? anon_vma_fork+0x273/0x2b0 [ 249.165802][T21436] dup_mmap+0x38e/0x9c0 [ 249.170085][T21436] dup_mm+0x7c/0x210 [ 249.173982][T21436] copy_process+0x1203/0x2e00 [ 249.178799][T21436] kernel_clone+0x14b/0x680 [ 249.183289][T21436] __se_sys_clone3+0x194/0x1d0 [ 249.188090][T21436] ? ksys_write+0x148/0x180 [ 249.192585][T21436] ? fpregs_assert_state_consistent+0x7d/0x90 [ 249.198673][T21436] ? exit_to_user_mode_prepare+0x65/0x190 [ 249.204655][T21436] __x64_sys_clone3+0x2d/0x40 [ 249.209326][T21436] do_syscall_64+0x4a/0x90 [ 249.213807][T21436] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 249.219684][T21436] RIP: 0033:0x4665d9 [ 249.223648][T21436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 249.243231][T21436] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 249.251621][T21436] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 249.259590][T21436] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 249.267560][T21436] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 249.275512][T21436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 249.283473][T21436] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:55:09 executing program 2: set_mempolicy(0x4001, &(0x7f0000000040)=0x8, 0x20) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x511880) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) set_mempolicy(0x0, &(0x7f0000000000)=0x7, 0xe1e) 19:55:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xd00000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:09 executing program 4 (fault-call:3 fault-nth:7): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:09 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x20020000, 0xac141409}}, 0x1c) [ 249.318714][T21435] loop1: detected capacity change from 0 to 264192 [ 249.358300][T21453] FAULT_INJECTION: forcing a failure. 19:55:09 executing program 3 (fault-call:3 fault-nth:78): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 249.358300][T21453] name failslab, interval 1, probability 0, space 0, times 0 [ 249.371033][T21453] CPU: 0 PID: 21453 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 249.379827][T21453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.389887][T21453] Call Trace: [ 249.393164][T21453] dump_stack+0x137/0x19d [ 249.397541][T21453] should_fail+0x23c/0x250 [ 249.401964][T21453] __should_failslab+0x81/0x90 [ 249.406731][T21453] should_failslab+0x5/0x20 [ 249.411242][T21453] kmem_cache_alloc_node+0x58/0x2b0 19:55:09 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000923000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) fork() 19:55:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xe00000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 249.416523][T21453] ? __alloc_skb+0xed/0x420 [ 249.421030][T21453] __alloc_skb+0xed/0x420 [ 249.425457][T21453] alloc_skb_with_frags+0x90/0x390 [ 249.430571][T21453] ? __find_rr_leaf+0x4a3/0x600 [ 249.435429][T21453] sock_alloc_send_pskb+0x436/0x4e0 [ 249.440635][T21453] ? fib6_table_lookup+0x530/0x5e0 [ 249.445919][T21453] sock_alloc_send_skb+0x2d/0x40 [ 249.450962][T21453] __ip6_append_data+0x1743/0x21a0 [ 249.456178][T21453] ? ip6_route_output_flags_noref+0x1b0/0x1b0 [ 249.462245][T21453] ? fib6_rule_lookup+0x85/0x160 [ 249.463694][T21461] FAULT_INJECTION: forcing a failure. [ 249.463694][T21461] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 249.467273][T21453] ip6_append_data+0x17e/0x230 [ 249.467297][T21453] ? icmpv6_xrlim_allow+0x220/0x220 [ 249.490471][T21453] ? icmpv6_xrlim_allow+0x220/0x220 [ 249.495675][T21453] icmp6_send+0xdbf/0x1260 [ 249.500089][T21453] ip6_link_failure+0x3b/0x1d0 [ 249.504856][T21453] ? ip6_negative_advice+0x260/0x260 [ 249.510124][T21453] sit_tunnel_xmit+0x8d4/0x11f0 [ 249.515182][T21453] xmit_one+0xf9/0x270 [ 249.519231][T21453] __dev_queue_xmit+0xcda/0x12a0 [ 249.524150][T21453] dev_queue_xmit+0x13/0x20 [ 249.528640][T21453] neigh_connected_output+0x264/0x290 [ 249.533994][T21453] ip6_finish_output2+0x8f5/0xa80 [ 249.539101][T21453] ip6_finish_output+0x428/0x480 [ 249.544065][T21453] ip6_output+0x10e/0x210 [ 249.548464][T21453] ? ip6_output+0x210/0x210 [ 249.552946][T21453] ip6_local_out+0x124/0x1e0 [ 249.557592][T21453] ? __ip6_local_out+0x1a0/0x1a0 [ 249.562565][T21453] ip6_push_pending_frames+0xb6/0x170 [ 249.568055][T21453] rawv6_sendmsg+0x1287/0x1330 [ 249.572835][T21453] ? __alloc_pages+0x194/0x320 [ 249.577590][T21453] ? kstrtoull+0x30e/0x350 [ 249.582079][T21453] inet_sendmsg+0x5f/0x80 [ 249.586444][T21453] __sys_sendto+0x2a8/0x370 [ 249.590930][T21453] ? __cond_resched+0x11/0x40 [ 249.597630][T21453] ? fput+0x2d/0x130 [ 249.601508][T21453] __x64_sys_sendto+0x74/0x90 [ 249.606164][T21453] do_syscall_64+0x4a/0x90 [ 249.610638][T21453] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 249.616516][T21453] RIP: 0033:0x4665d9 [ 249.620388][T21453] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 249.639980][T21453] RSP: 002b:00007f1711f79188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 249.648426][T21453] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 249.656376][T21453] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 249.664332][T21453] RBP: 00007f1711f791d0 R08: 00000000200000c0 R09: 000000000000001c [ 249.672338][T21453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 249.680459][T21453] R13: 00007ffee020149f R14: 00007f1711f79300 R15: 0000000000022000 [ 249.688437][T21461] CPU: 1 PID: 21461 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 249.697327][T21461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.707372][T21461] Call Trace: [ 249.710636][T21461] dump_stack+0x137/0x19d [ 249.714961][T21461] should_fail+0x23c/0x250 [ 249.719375][T21461] __alloc_pages+0x102/0x320 [ 249.724026][T21461] alloc_pages+0x21d/0x310 [ 249.728427][T21461] pte_alloc_one+0x29/0xb0 [ 249.732843][T21461] __pte_alloc+0x2f/0x210 [ 249.737282][T21461] copy_pte_range+0x128e/0x1460 [ 249.742141][T21461] ? __alloc_pages+0x194/0x320 [ 249.746925][T21461] copy_page_range+0x5da/0x8e0 [ 249.751683][T21461] dup_mmap+0x6ab/0x9c0 [ 249.755850][T21461] dup_mm+0x7c/0x210 [ 249.759743][T21461] copy_process+0x1203/0x2e00 [ 249.764499][T21461] kernel_clone+0x14b/0x680 [ 249.768998][T21461] __se_sys_clone3+0x194/0x1d0 [ 249.773739][T21461] ? ksys_write+0x148/0x180 [ 249.778221][T21461] ? fpregs_assert_state_consistent+0x7d/0x90 [ 249.784312][T21461] ? exit_to_user_mode_prepare+0x65/0x190 [ 249.790035][T21461] __x64_sys_clone3+0x2d/0x40 [ 249.794701][T21461] do_syscall_64+0x4a/0x90 [ 249.799118][T21461] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 249.805109][T21461] RIP: 0033:0x4665d9 [ 249.808982][T21461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 249.828667][T21461] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 249.837230][T21461] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 249.845185][T21461] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 249.853241][T21461] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 249.861375][T21461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 19:55:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x1000000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:09 executing program 4 (fault-call:3 fault-nth:8): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 249.869357][T21461] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 249.891066][T21435] loop1: p1[EZD] p3 [ 249.896127][T21435] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:09 executing program 1: syz_read_part_table(0xffffffffffff0700, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:09 executing program 3 (fault-call:3 fault-nth:79): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:09 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x28000000, 0xac141409}}, 0x1c) 19:55:09 executing program 2: write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) fallocate(0xffffffffffffffff, 0x16, 0xfff, 0x4) ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000380)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xe00480f3, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20003220}], 0x10, 0x0, 0xef013080, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @broadcast}, 0x10) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/140, 0x8c}], 0x1, 0xd9f, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f166588b967483641ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) fcntl$setstatus(r0, 0x4, 0x4000) [ 249.928809][T21435] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 249.963680][T21479] FAULT_INJECTION: forcing a failure. [ 249.963680][T21479] name failslab, interval 1, probability 0, space 0, times 0 [ 249.976323][T21479] CPU: 0 PID: 21479 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 249.985244][T21479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.993877][T21485] FAULT_INJECTION: forcing a failure. [ 249.993877][T21485] name failslab, interval 1, probability 0, space 0, times 0 [ 249.995329][T21479] Call Trace: [ 249.995338][T21479] dump_stack+0x137/0x19d [ 250.015496][T21479] should_fail+0x23c/0x250 [ 250.019906][T21479] __should_failslab+0x81/0x90 [ 250.024675][T21479] should_failslab+0x5/0x20 [ 250.029163][T21479] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 250.034880][T21479] ? __kmalloc_node_track_caller+0x30/0x40 [ 250.040715][T21479] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 250.046157][T21479] __kmalloc_node_track_caller+0x30/0x40 [ 250.051777][T21479] ? alloc_skb_with_frags+0x90/0x390 [ 250.057047][T21479] __alloc_skb+0x187/0x420 [ 250.061524][T21479] alloc_skb_with_frags+0x90/0x390 [ 250.066634][T21479] ? __find_rr_leaf+0x4a3/0x600 [ 250.071664][T21479] sock_alloc_send_pskb+0x436/0x4e0 [ 250.076946][T21479] ? fib6_table_lookup+0x530/0x5e0 [ 250.082055][T21479] sock_alloc_send_skb+0x2d/0x40 [ 250.087124][T21479] __ip6_append_data+0x1743/0x21a0 [ 250.092220][T21479] ? ip6_route_output_flags_noref+0x1b0/0x1b0 [ 250.098324][T21479] ? fib6_rule_lookup+0x85/0x160 [ 250.103308][T21479] ip6_append_data+0x17e/0x230 [ 250.108052][T21479] ? icmpv6_xrlim_allow+0x220/0x220 [ 250.113238][T21479] ? icmpv6_xrlim_allow+0x220/0x220 [ 250.118469][T21479] icmp6_send+0xdbf/0x1260 [ 250.122871][T21479] ip6_link_failure+0x3b/0x1d0 [ 250.127616][T21479] ? ip6_negative_advice+0x260/0x260 [ 250.132882][T21479] sit_tunnel_xmit+0x8d4/0x11f0 [ 250.137838][T21479] xmit_one+0xf9/0x270 [ 250.141959][T21479] __dev_queue_xmit+0xcda/0x12a0 [ 250.146968][T21479] dev_queue_xmit+0x13/0x20 [ 250.151452][T21479] neigh_connected_output+0x264/0x290 [ 250.156805][T21479] ip6_finish_output2+0x8f5/0xa80 [ 250.161811][T21479] ip6_finish_output+0x428/0x480 [ 250.166744][T21479] ip6_output+0x10e/0x210 [ 250.171064][T21479] ? ip6_output+0x210/0x210 [ 250.175649][T21479] ip6_local_out+0x124/0x1e0 [ 250.180337][T21479] ? __ip6_local_out+0x1a0/0x1a0 [ 250.185329][T21479] ip6_push_pending_frames+0xb6/0x170 [ 250.190734][T21479] rawv6_sendmsg+0x1287/0x1330 [ 250.195483][T21479] ? __alloc_pages+0x194/0x320 [ 250.200226][T21479] ? kstrtoull+0x30e/0x350 [ 250.204697][T21479] inet_sendmsg+0x5f/0x80 [ 250.209010][T21479] __sys_sendto+0x2a8/0x370 [ 250.213582][T21479] ? __cond_resched+0x11/0x40 [ 250.218241][T21479] ? fput+0x2d/0x130 [ 250.222204][T21479] __x64_sys_sendto+0x74/0x90 [ 250.226864][T21479] do_syscall_64+0x4a/0x90 [ 250.231263][T21479] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 250.237255][T21479] RIP: 0033:0x4665d9 [ 250.241136][T21479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 250.262268][T21479] RSP: 002b:00007f1711f79188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 250.270661][T21479] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 250.278775][T21479] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 250.286844][T21479] RBP: 00007f1711f791d0 R08: 00000000200000c0 R09: 000000000000001c [ 250.295317][T21479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 250.303280][T21479] R13: 00007ffee020149f R14: 00007f1711f79300 R15: 0000000000022000 [ 250.311264][T21485] CPU: 1 PID: 21485 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 250.320099][T21485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.330157][T21485] Call Trace: [ 250.333466][T21485] dump_stack+0x137/0x19d [ 250.337918][T21485] should_fail+0x23c/0x250 [ 250.342335][T21485] ? anon_vma_clone+0x8d/0x380 [ 250.348713][T21485] __should_failslab+0x81/0x90 [ 250.353515][T21485] should_failslab+0x5/0x20 [ 250.358037][T21485] kmem_cache_alloc+0x46/0x2f0 [ 250.363757][T21485] ? avc_has_perm_noaudit+0x19a/0x240 [ 250.369175][T21485] anon_vma_clone+0x8d/0x380 [ 250.373889][T21485] anon_vma_fork+0x54/0x2b0 [ 250.378437][T21485] dup_mmap+0x49c/0x9c0 [ 250.382594][T21485] dup_mm+0x7c/0x210 [ 250.386606][T21485] copy_process+0x1203/0x2e00 [ 250.391274][T21485] kernel_clone+0x14b/0x680 [ 250.395772][T21485] __se_sys_clone3+0x194/0x1d0 [ 250.400531][T21485] ? ksys_write+0x148/0x180 [ 250.405032][T21485] ? fpregs_assert_state_consistent+0x7d/0x90 [ 250.411134][T21485] ? exit_to_user_mode_prepare+0x65/0x190 [ 250.417044][T21485] __x64_sys_clone3+0x2d/0x40 [ 250.421723][T21485] do_syscall_64+0x4a/0x90 [ 250.426202][T21485] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 250.432206][T21485] RIP: 0033:0x4665d9 [ 250.436094][T21485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 250.455936][T21485] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 250.464389][T21485] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 250.472357][T21485] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 19:55:10 executing program 2: r0 = perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$tty1(0xc, 0x4, 0x3) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) mmap(&(0x7f0000b52000/0x3000)=nil, 0x3000, 0x2800004, 0x4010, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xc) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0xb, 0x0, 0xc04a01) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x100000003) madvise(&(0x7f0000954000/0x4000)=nil, 0x4000, 0x2) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x40049409, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000080)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 19:55:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x1100000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:10 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x30000000, 0xac141409}}, 0x1c) [ 250.480417][T21485] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 250.488388][T21485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 250.496352][T21485] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:55:10 executing program 3 (fault-call:3 fault-nth:80): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 250.581065][T21273] blk_update_request: I/O error, dev loop1, sector 264033 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 250.581103][T21267] blk_update_request: I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 250.597313][ T851] blk_update_request: I/O error, dev loop1, sector 264033 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 250.605378][ T1794] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 250.615741][ T851] Buffer I/O error on dev loop1p3, logical block 263808, async page read [ 250.623530][ T851] blk_update_request: I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 250.642666][ T851] Buffer I/O error on dev loop1p1, logical block 33008, async page read [ 250.651184][ T851] blk_update_request: I/O error, dev loop1, sector 264034 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 250.662602][ T851] Buffer I/O error on dev loop1p3, logical block 263809, async page read [ 250.671052][ T851] blk_update_request: I/O error, dev loop1, sector 264035 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 250.677044][T21507] FAULT_INJECTION: forcing a failure. [ 250.677044][T21507] name failslab, interval 1, probability 0, space 0, times 0 [ 250.682497][ T851] Buffer I/O error on dev loop1p3, logical block 263810, async page read [ 250.695085][T21507] CPU: 0 PID: 21507 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 250.703515][ T851] blk_update_request: I/O error, dev loop1, sector 264036 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 250.712301][T21507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.712314][T21507] Call Trace: [ 250.712321][T21507] dump_stack+0x137/0x19d [ 250.723609][ T851] Buffer I/O error on dev loop1p3, logical block 263811, async page read [ 250.733737][T21507] should_fail+0x23c/0x250 [ 250.733763][T21507] ? anon_vma_fork+0x117/0x2b0 [ 250.737053][ T851] Buffer I/O error on dev loop1p3, logical block 263812, async page read [ 250.741337][T21507] __should_failslab+0x81/0x90 [ 250.749787][ T851] Buffer I/O error on dev loop1p3, logical block 263813, async page read [ 250.754157][T21507] should_failslab+0x5/0x20 [ 250.758898][ T851] Buffer I/O error on dev loop1p3, logical block 263814, async page read [ 250.767286][T21507] kmem_cache_alloc+0x46/0x2f0 [ 250.772086][ T851] Buffer I/O error on dev loop1p3, logical block 263815, async page read [ 250.780413][T21507] ? anon_vma_fork+0xb1/0x2b0 [ 250.811140][T21507] anon_vma_fork+0x117/0x2b0 [ 250.815775][T21507] dup_mmap+0x49c/0x9c0 [ 250.819936][T21507] dup_mm+0x7c/0x210 [ 250.823866][T21507] copy_process+0x1203/0x2e00 [ 250.828620][T21507] kernel_clone+0x14b/0x680 [ 250.833185][T21507] __se_sys_clone3+0x194/0x1d0 [ 250.837952][T21507] ? ksys_write+0x148/0x180 [ 250.842460][T21507] ? fpregs_assert_state_consistent+0x7d/0x90 [ 250.848558][T21507] ? exit_to_user_mode_prepare+0x65/0x190 [ 250.854345][T21507] __x64_sys_clone3+0x2d/0x40 [ 250.859021][T21507] do_syscall_64+0x4a/0x90 [ 250.863442][T21507] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 250.869354][T21507] RIP: 0033:0x4665d9 19:55:10 executing program 4 (fault-call:3 fault-nth:9): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x1200000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 250.873238][T21507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 250.892865][T21507] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 250.894706][T21514] FAULT_INJECTION: forcing a failure. [ 250.894706][T21514] name failslab, interval 1, probability 0, space 0, times 0 [ 250.901360][T21507] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 250.901375][T21507] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 250.901387][T21507] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 250.901398][T21507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 250.901409][T21507] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 250.954007][T21514] CPU: 1 PID: 21514 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 250.962806][T21514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.972954][T21514] Call Trace: [ 250.976248][T21514] dump_stack+0x137/0x19d 19:55:10 executing program 3 (fault-call:3 fault-nth:81): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 250.980650][T21514] should_fail+0x23c/0x250 [ 250.985100][T21514] ? skb_clone+0x12c/0x1f0 [ 250.989513][T21514] __should_failslab+0x81/0x90 [ 250.994278][T21514] should_failslab+0x5/0x20 [ 250.998774][T21514] kmem_cache_alloc+0x46/0x2f0 [ 251.003539][T21514] skb_clone+0x12c/0x1f0 [ 251.007778][T21514] packet_rcv+0x3e6/0xa20 [ 251.012195][T21514] ? packet_sock_destruct+0xc0/0xc0 [ 251.017414][T21514] dev_queue_xmit_nit+0x382/0x5f0 [ 251.022526][T21514] xmit_one+0x71/0x270 [ 251.026680][T21514] __dev_queue_xmit+0xcda/0x12a0 [ 251.031624][T21514] ? netlbl_enabled+0x21/0x30 [ 251.036355][T21514] ? selinux_ip_postroute+0x19a/0x9d0 [ 251.041812][T21514] dev_queue_xmit+0x13/0x20 [ 251.044956][T21517] FAULT_INJECTION: forcing a failure. [ 251.044956][T21517] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 251.046478][T21514] ip6_finish_output2+0x8ce/0xa80 [ 251.064798][T21514] ip6_finish_output+0x428/0x480 [ 251.069730][T21514] ip6_output+0x10e/0x210 [ 251.074051][T21514] ? ip6_output+0x210/0x210 [ 251.078554][T21514] ip6_local_out+0x124/0x1e0 [ 251.083131][T21514] ? __ip6_local_out+0x1a0/0x1a0 [ 251.088089][T21514] ip6_push_pending_frames+0xb6/0x170 [ 251.093628][T21514] icmpv6_push_pending_frames+0x1ff/0x210 [ 251.099439][T21514] icmp6_send+0xe3d/0x1260 [ 251.103858][T21514] ip6_link_failure+0x3b/0x1d0 [ 251.108606][T21514] ? ip6_negative_advice+0x260/0x260 [ 251.113886][T21514] sit_tunnel_xmit+0x8d4/0x11f0 [ 251.118723][T21514] xmit_one+0xf9/0x270 [ 251.122862][T21514] __dev_queue_xmit+0xcda/0x12a0 [ 251.127780][T21514] dev_queue_xmit+0x13/0x20 [ 251.132337][T21514] neigh_connected_output+0x264/0x290 [ 251.137961][T21514] ip6_finish_output2+0x8f5/0xa80 [ 251.142968][T21514] ip6_finish_output+0x428/0x480 [ 251.148049][T21514] ip6_output+0x10e/0x210 [ 251.152429][T21514] ? ip6_output+0x210/0x210 [ 251.157095][T21514] ip6_local_out+0x124/0x1e0 [ 251.161755][T21514] ? __ip6_local_out+0x1a0/0x1a0 [ 251.166700][T21514] ip6_push_pending_frames+0xb6/0x170 [ 251.172137][T21514] rawv6_sendmsg+0x1287/0x1330 [ 251.177076][T21514] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 251.182924][T21514] ? __list_add_valid+0x28/0x90 [ 251.187866][T21514] ? kstrtoull+0x30e/0x350 [ 251.192312][T21514] inet_sendmsg+0x5f/0x80 [ 251.196699][T21514] __sys_sendto+0x2a8/0x370 [ 251.201225][T21514] ? __cond_resched+0x11/0x40 [ 251.205884][T21514] ? fput+0x2d/0x130 [ 251.209761][T21514] __x64_sys_sendto+0x74/0x90 [ 251.214435][T21514] do_syscall_64+0x4a/0x90 [ 251.218837][T21514] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 251.224716][T21514] RIP: 0033:0x4665d9 [ 251.228602][T21514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 251.248290][T21514] RSP: 002b:00007f1711f37188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 251.256682][T21514] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665d9 [ 251.264633][T21514] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 251.272585][T21514] RBP: 00007f1711f371d0 R08: 00000000200000c0 R09: 000000000000001c [ 251.280538][T21514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 251.288488][T21514] R13: 00007ffee020149f R14: 00007f1711f37300 R15: 0000000000022000 [ 251.296463][T21517] CPU: 0 PID: 21517 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 251.305314][T21517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.315390][T21517] Call Trace: [ 251.318751][T21517] dump_stack+0x137/0x19d [ 251.323178][T21517] should_fail+0x23c/0x250 [ 251.327589][T21517] __alloc_pages+0x102/0x320 [ 251.332190][T21517] alloc_pages+0x21d/0x310 [ 251.336604][T21517] get_zeroed_page+0x13/0x40 [ 251.341195][T21517] __pud_alloc+0x44/0x190 [ 251.345532][T21517] copy_page_range+0x73a/0x8e0 [ 251.350295][T21517] ? vma_interval_tree_augment_rotate+0x100/0x100 [ 251.356709][T21517] ? __do_sys_brk+0x580/0x580 [ 251.361469][T21517] ? anon_vma_fork+0x273/0x2b0 [ 251.366230][T21517] dup_mmap+0x6ab/0x9c0 [ 251.370383][T21517] dup_mm+0x7c/0x210 [ 251.374525][T21517] copy_process+0x1203/0x2e00 [ 251.379197][T21517] kernel_clone+0x14b/0x680 [ 251.383782][T21517] __se_sys_clone3+0x194/0x1d0 [ 251.388568][T21517] ? ksys_write+0x148/0x180 [ 251.393241][T21517] ? fpregs_assert_state_consistent+0x7d/0x90 [ 251.399351][T21517] ? exit_to_user_mode_prepare+0x65/0x190 [ 251.405106][T21517] __x64_sys_clone3+0x2d/0x40 [ 251.409792][T21517] do_syscall_64+0x4a/0x90 [ 251.414238][T21517] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 251.420138][T21517] RIP: 0033:0x4665d9 19:55:11 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x3f000000, 0xac141409}}, 0x1c) [ 251.424030][T21517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 251.424859][T21515] loop1: detected capacity change from 0 to 264192 [ 251.443734][T21517] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 251.443758][T21517] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 251.443768][T21517] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 251.443778][T21517] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 251.443789][T21517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 251.443799][T21517] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 251.510391][T21514] syz-executor.4 (21514) used greatest stack depth: 10224 bytes left [ 251.573187][T21515] loop1: p1[EZD] p3 [ 251.579895][T21515] loop1: p1 size 11290111 extends beyond EOD, truncated [ 251.587443][T21515] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 251.657072][T21515] loop1: detected capacity change from 0 to 264192 [ 251.693523][T21515] loop1: p1[EZD] p3 [ 251.697698][T21515] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:11 executing program 1: syz_read_part_table(0xfffffffffffffdef, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x2000000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:11 executing program 3 (fault-call:3 fault-nth:82): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:11 executing program 4 (fault-call:3 fault-nth:10): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:11 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x40000000, 0xac141409}}, 0x1c) 19:55:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x0) r0 = inotify_init() r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00001aa000/0x5000)=nil, 0x5000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = inotify_init() writev(r2, &(0x7f0000000240)=[{&(0x7f00000000c0)="463ee5f9adcf00c3b67aa882cbff2359d90ad56638fbf5df860d6fa868236fb606f105f3aff1d748aa478189e448b74c1f5e4b053a79d96fd2237c6ebe7b3697e35b2cc9ba82a5ca64bfe735df23205a60727147652ef5d37970e208ce2f7aa2acb8ebfca654a3a0be8978b35c", 0x6d}, {&(0x7f0000000040)}, {&(0x7f0000000140)="9e", 0x1}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000000180)="0cf66210e932ecc1313d2d6deb0a59f0a364bbd5311288c1b0c5e622f3dfc7e43cb9c66fe0476117574c1c6975502dc3b2b486cfe7e0afb5a6bac8d2c9ea5082ff270e0ff8d76901319bb063b0ea563c0f56415d91bf3e463aad60baf6989cb5319810d55fcb8c8fbcc5c65df4eb74c88e98ea354b6d0eaeebdf16d389a3b00a88c4be80623f4d6f3ef0c319d78b4e310f5dcbab24cb50faadf86316", 0x9c}], 0x5) inotify_add_watch(r2, &(0x7f0000000080)='./file0\x00', 0x3) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0xa0000221) rmdir(&(0x7f0000000000)='./file0\x00') [ 251.706314][T21515] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 251.758534][T21572] FAULT_INJECTION: forcing a failure. [ 251.758534][T21572] name failslab, interval 1, probability 0, space 0, times 0 [ 251.771173][T21572] CPU: 1 PID: 21572 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 251.776173][T21576] FAULT_INJECTION: forcing a failure. [ 251.776173][T21576] name failslab, interval 1, probability 0, space 0, times 0 [ 251.780122][T21572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.780136][T21572] Call Trace: [ 251.780142][T21572] dump_stack+0x137/0x19d [ 251.780167][T21572] should_fail+0x23c/0x250 [ 251.814970][T21572] ? skb_clone+0x12c/0x1f0 [ 251.819664][T21572] __should_failslab+0x81/0x90 [ 251.824673][T21572] should_failslab+0x5/0x20 [ 251.829161][T21572] kmem_cache_alloc+0x46/0x2f0 [ 251.834016][T21572] skb_clone+0x12c/0x1f0 [ 251.838238][T21572] packet_rcv+0x3e6/0xa20 [ 251.842545][T21572] ? packet_sock_destruct+0xc0/0xc0 [ 251.847812][T21572] dev_queue_xmit_nit+0x382/0x5f0 [ 251.852815][T21572] xmit_one+0x71/0x270 [ 251.856861][T21572] __dev_queue_xmit+0xcda/0x12a0 [ 251.861778][T21572] ? netlbl_enabled+0x21/0x30 [ 251.866447][T21572] ? selinux_ip_postroute+0x19a/0x9d0 [ 251.871926][T21572] dev_queue_xmit+0x13/0x20 [ 251.876495][T21572] ip6_finish_output2+0x8ce/0xa80 [ 251.881552][T21572] ip6_finish_output+0x428/0x480 [ 251.886472][T21572] ip6_output+0x10e/0x210 [ 251.890868][T21572] ? ip6_output+0x210/0x210 [ 251.895352][T21572] ip6_local_out+0x124/0x1e0 [ 251.899929][T21572] ? __ip6_local_out+0x1a0/0x1a0 [ 251.904885][T21572] ip6_push_pending_frames+0xb6/0x170 [ 251.910254][T21572] icmpv6_push_pending_frames+0x1ff/0x210 [ 251.917344][T21572] icmp6_send+0xe3d/0x1260 [ 251.921847][T21572] ip6_link_failure+0x3b/0x1d0 [ 251.926615][T21572] ? ip6_negative_advice+0x260/0x260 [ 251.931881][T21572] sit_tunnel_xmit+0x8d4/0x11f0 [ 251.937063][T21572] xmit_one+0xf9/0x270 [ 251.941131][T21572] __dev_queue_xmit+0xcda/0x12a0 [ 251.946055][T21572] dev_queue_xmit+0x13/0x20 [ 251.950547][T21572] neigh_connected_output+0x264/0x290 [ 251.955941][T21572] ip6_finish_output2+0x8f5/0xa80 [ 251.960958][T21572] ip6_finish_output+0x428/0x480 [ 251.965955][T21572] ip6_output+0x10e/0x210 [ 251.970355][T21572] ? ip6_output+0x210/0x210 [ 251.974864][T21572] ip6_local_out+0x124/0x1e0 [ 251.979496][T21572] ? __ip6_local_out+0x1a0/0x1a0 [ 251.984419][T21572] ip6_push_pending_frames+0xb6/0x170 [ 251.989776][T21572] rawv6_sendmsg+0x1287/0x1330 [ 251.994598][T21572] ? __alloc_pages+0x194/0x320 [ 251.999346][T21572] ? kstrtoull+0x30e/0x350 [ 252.003746][T21572] inet_sendmsg+0x5f/0x80 [ 252.008235][T21572] __sys_sendto+0x2a8/0x370 [ 252.012738][T21572] ? __cond_resched+0x11/0x40 [ 252.017402][T21572] ? fput+0x2d/0x130 [ 252.021301][T21572] __x64_sys_sendto+0x74/0x90 [ 252.026131][T21572] do_syscall_64+0x4a/0x90 [ 252.030731][T21572] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 252.036698][T21572] RIP: 0033:0x4665d9 [ 252.040574][T21572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 252.060258][T21572] RSP: 002b:00007f1711f79188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 252.068762][T21572] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 252.076812][T21572] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 252.084872][T21572] RBP: 00007f1711f791d0 R08: 00000000200000c0 R09: 000000000000001c [ 252.092957][T21572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 252.100908][T21572] R13: 00007ffee020149f R14: 00007f1711f79300 R15: 0000000000022000 [ 252.108869][T21576] CPU: 0 PID: 21576 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 252.118758][T21576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.128806][T21576] Call Trace: [ 252.132261][T21576] dump_stack+0x137/0x19d [ 252.136664][T21576] should_fail+0x23c/0x250 [ 252.141072][T21576] ? dup_mmap+0x38e/0x9c0 [ 252.145400][T21576] __should_failslab+0x81/0x90 [ 252.150333][T21576] should_failslab+0x5/0x20 [ 252.154835][T21576] kmem_cache_alloc+0x46/0x2f0 19:55:12 executing program 2: memfd_create(&(0x7f0000000000)='b\n\x00', 0x4) r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r0, 0x409, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x257df000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000003, 0x13, r0, 0x0) 19:55:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x2010000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 252.159599][T21576] ? __vma_link_rb+0x3c2/0x3e0 [ 252.164533][T21576] ? up_write+0x25/0xc0 [ 252.168690][T21576] dup_mmap+0x38e/0x9c0 [ 252.172939][T21576] dup_mm+0x7c/0x210 [ 252.176832][T21576] copy_process+0x1203/0x2e00 [ 252.181507][T21576] kernel_clone+0x14b/0x680 [ 252.186065][T21576] __se_sys_clone3+0x194/0x1d0 [ 252.190916][T21576] ? ksys_write+0x148/0x180 [ 252.195433][T21576] ? fpregs_assert_state_consistent+0x7d/0x90 [ 252.201533][T21576] ? exit_to_user_mode_prepare+0x65/0x190 [ 252.207338][T21576] __x64_sys_clone3+0x2d/0x40 [ 252.212051][T21576] do_syscall_64+0x4a/0x90 [ 252.216511][T21576] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 252.222453][T21576] RIP: 0033:0x4665d9 [ 252.226386][T21576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 252.246076][T21576] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 19:55:12 executing program 4 (fault-call:3 fault-nth:11): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 252.254485][T21576] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 252.262524][T21576] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 252.270492][T21576] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 252.278473][T21576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 252.285240][T21578] loop1: detected capacity change from 0 to 264192 [ 252.286438][T21576] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 19:55:12 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x58000000, 0xac141409}}, 0x1c) [ 252.329704][T21578] loop1: p1[EZD] p3 [ 252.333781][T21578] loop1: p1 size 11290111 extends beyond EOD, truncated [ 252.344869][T21600] FAULT_INJECTION: forcing a failure. [ 252.344869][T21600] name failslab, interval 1, probability 0, space 0, times 0 [ 252.357518][T21600] CPU: 0 PID: 21600 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 252.362719][T21578] loop1: p3 size 1912633224 extends beyond EOD, 19:55:12 executing program 3 (fault-call:3 fault-nth:83): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 252.366374][T21600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.366388][T21600] Call Trace: [ 252.366395][T21600] dump_stack+0x137/0x19d [ 252.372736][T21578] truncated [ 252.382767][T21600] should_fail+0x23c/0x250 [ 252.382794][T21600] ? skb_clone+0x12c/0x1f0 [ 252.402270][T21600] __should_failslab+0x81/0x90 [ 252.407050][T21600] should_failslab+0x5/0x20 [ 252.411626][T21600] kmem_cache_alloc+0x46/0x2f0 [ 252.416472][T21600] skb_clone+0x12c/0x1f0 [ 252.420722][T21600] packet_rcv+0x3e6/0xa20 [ 252.425119][T21600] ? packet_sock_destruct+0xc0/0xc0 19:55:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x2500000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 252.430356][T21600] dev_queue_xmit_nit+0x382/0x5f0 [ 252.435396][T21600] xmit_one+0x71/0x270 [ 252.439456][T21600] __dev_queue_xmit+0xcda/0x12a0 [ 252.444453][T21600] ? netlbl_enabled+0x21/0x30 [ 252.449160][T21600] ? selinux_ip_postroute+0x19a/0x9d0 [ 252.454558][T21600] dev_queue_xmit+0x13/0x20 [ 252.459088][T21600] ip6_finish_output2+0x8ce/0xa80 [ 252.464112][T21600] ip6_finish_output+0x428/0x480 [ 252.469140][T21600] ip6_output+0x10e/0x210 [ 252.473475][T21600] ? ip6_output+0x210/0x210 [ 252.478028][T21600] ip6_local_out+0x124/0x1e0 [ 252.482628][T21600] ? __ip6_local_out+0x1a0/0x1a0 [ 252.487668][T21600] ip6_push_pending_frames+0xb6/0x170 [ 252.493042][T21609] FAULT_INJECTION: forcing a failure. [ 252.493042][T21609] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 252.493046][T21600] icmpv6_push_pending_frames+0x1ff/0x210 [ 252.511977][T21600] icmp6_send+0xe3d/0x1260 [ 252.516463][T21600] ip6_link_failure+0x3b/0x1d0 [ 252.521273][T21600] ? ip6_negative_advice+0x260/0x260 [ 252.526543][T21600] sit_tunnel_xmit+0x8d4/0x11f0 [ 252.531504][T21600] xmit_one+0xf9/0x270 [ 252.535595][T21600] __dev_queue_xmit+0xcda/0x12a0 [ 252.540511][T21600] dev_queue_xmit+0x13/0x20 [ 252.544996][T21600] neigh_connected_output+0x264/0x290 [ 252.550450][T21600] ip6_finish_output2+0x8f5/0xa80 [ 252.555546][T21600] ip6_finish_output+0x428/0x480 [ 252.560549][T21600] ip6_output+0x10e/0x210 [ 252.564859][T21600] ? ip6_output+0x210/0x210 [ 252.569340][T21600] ip6_local_out+0x124/0x1e0 [ 252.573913][T21600] ? __ip6_local_out+0x1a0/0x1a0 [ 252.578900][T21600] ip6_push_pending_frames+0xb6/0x170 [ 252.584335][T21600] rawv6_sendmsg+0x1287/0x1330 [ 252.589095][T21600] ? __alloc_pages+0x194/0x320 [ 252.593843][T21600] ? kstrtoull+0x30e/0x350 [ 252.598331][T21600] inet_sendmsg+0x5f/0x80 [ 252.602643][T21600] __sys_sendto+0x2a8/0x370 [ 252.607220][T21600] ? __cond_resched+0x11/0x40 [ 252.611876][T21600] ? fput+0x2d/0x130 [ 252.615749][T21600] __x64_sys_sendto+0x74/0x90 [ 252.620402][T21600] do_syscall_64+0x4a/0x90 [ 252.624923][T21600] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 252.630806][T21600] RIP: 0033:0x4665d9 [ 252.634679][T21600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 252.654311][T21600] RSP: 002b:00007f1711f79188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 252.662702][T21600] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 252.670724][T21600] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 252.678770][T21600] RBP: 00007f1711f791d0 R08: 00000000200000c0 R09: 000000000000001c [ 252.686727][T21600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 252.694687][T21600] R13: 00007ffee020149f R14: 00007f1711f79300 R15: 0000000000022000 [ 252.702642][T21609] CPU: 1 PID: 21609 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 252.711660][T21609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.721726][T21609] Call Trace: [ 252.725011][T21609] dump_stack+0x137/0x19d [ 252.729337][T21609] should_fail+0x23c/0x250 [ 252.733743][T21609] __alloc_pages+0x102/0x320 [ 252.738323][T21609] alloc_pages+0x21d/0x310 [ 252.742758][T21609] pte_alloc_one+0x29/0xb0 [ 252.747157][T21609] __pte_alloc+0x2f/0x210 [ 252.751506][T21609] copy_pte_range+0x128e/0x1460 [ 252.756344][T21609] ? __alloc_pages+0x194/0x320 [ 252.761084][T21609] copy_page_range+0x5da/0x8e0 [ 252.765829][T21609] ? anon_vma_fork+0x273/0x2b0 [ 252.770588][T21609] dup_mmap+0x6ab/0x9c0 [ 252.774725][T21609] dup_mm+0x7c/0x210 [ 252.778629][T21609] copy_process+0x1203/0x2e00 [ 252.783291][T21609] kernel_clone+0x14b/0x680 [ 252.787781][T21609] __se_sys_clone3+0x194/0x1d0 [ 252.792535][T21609] ? ksys_write+0x148/0x180 [ 252.797543][T21609] ? fpregs_assert_state_consistent+0x7d/0x90 [ 252.803601][T21609] ? exit_to_user_mode_prepare+0x65/0x190 [ 252.809306][T21609] __x64_sys_clone3+0x2d/0x40 [ 252.814072][T21609] do_syscall_64+0x4a/0x90 [ 252.818471][T21609] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 252.824364][T21609] RIP: 0033:0x4665d9 [ 252.828247][T21609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 252.847833][T21609] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 252.856224][T21609] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 252.864175][T21609] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 252.872129][T21609] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 19:55:12 executing program 1: syz_read_part_table(0xfffffffffffffffe, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000780)={{0x0, 0x7, 0x1, 0x80000001, 0x6, 0x7ff, 0x1, 0x8, 0xc0c4, 0x8, 0x8, 0x9, 0x80, 0x4, 0x5}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x800, 0x80000001) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000280)={0x20, "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"}) fcntl$addseals(r1, 0x409, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000080), &(0x7f0000000100)={'L-', 0x3}, 0x16, 0x2) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000840)={'syz1', "d55e230fcc60988f1f7a3fd356ae8176776686efc12b518383a711a282a714a5aa799bb9"}, 0x28) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040832090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@fat=@check_strict}, {@fat=@nocase}]}) write$binfmt_aout(r0, &(0x7f0000000540)={{0xcc, 0x3, 0x40, 0x260, 0x379, 0x9, 0x2c4, 0x3}, "68b40f131c8340abb19bd12ed566cb957c4c3753c683bd69f6d86743c8a3d64245eda826e755d12f111b006a02295ee5dcd5035908309e4353b822b7e59ca151a4dab7aae850b16a2c5a15a49a0aa991076526540ef5966e7626f5d8d87a3835004b148b633ff482adb1df85542af28295e0eef337ac4c5af9c63edd03fcb250dae5308e30b21e1e082410604aa6a9fedf0b3d5d291a0ce544dd3b774fbfb9036ccfda2e3376af80b1289f9198ec57f5fad33dc4a991965543ffbaab8b3b62e3c6cde8e269add335146bf0bc151fbc5407a61c04094605ddb703062436660dcaed20dd4a8f6b839341853f51dc73170c", ['\x00']}, 0x210) 19:55:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x3915000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:12 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x60000000, 0xac141409}}, 0x1c) 19:55:12 executing program 4 (fault-call:3 fault-nth:12): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:12 executing program 3 (fault-call:3 fault-nth:84): unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 252.880091][T21609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 252.888045][T21609] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 252.964918][T21626] loop1: detected capacity change from 0 to 264192 [ 252.965126][T21625] FAULT_INJECTION: forcing a failure. [ 252.965126][T21625] name failslab, interval 1, probability 0, space 0, times 0 [ 252.984165][T21625] CPU: 1 PID: 21625 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 252.992922][T21625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.003070][T21625] Call Trace: [ 253.006347][T21625] dump_stack+0x137/0x19d [ 253.010680][T21625] should_fail+0x23c/0x250 [ 253.015099][T21625] ? skb_clone+0x12c/0x1f0 [ 253.019538][T21625] __should_failslab+0x81/0x90 [ 253.024303][T21625] should_failslab+0x5/0x20 [ 253.027057][T21632] FAULT_INJECTION: forcing a failure. [ 253.027057][T21632] name failslab, interval 1, probability 0, space 0, times 0 [ 253.028800][T21625] kmem_cache_alloc+0x46/0x2f0 [ 253.028826][T21625] ? __skb_clone+0x2b9/0x2d0 [ 253.050697][T21625] skb_clone+0x12c/0x1f0 [ 253.054925][T21625] packet_rcv+0x3e6/0xa20 [ 253.059270][T21625] ? packet_sock_destruct+0xc0/0xc0 [ 253.064446][T21625] dev_queue_xmit_nit+0x382/0x5f0 [ 253.069469][T21625] xmit_one+0x71/0x270 [ 253.073530][T21625] __dev_queue_xmit+0xcda/0x12a0 [ 253.078448][T21625] ? netlbl_enabled+0x21/0x30 [ 253.083123][T21625] ? selinux_ip_postroute+0x19a/0x9d0 [ 253.088500][T21625] dev_queue_xmit+0x13/0x20 [ 253.092991][T21625] ip6_finish_output2+0x8ce/0xa80 [ 253.098037][T21625] ip6_finish_output+0x428/0x480 [ 253.102963][T21625] ip6_output+0x10e/0x210 [ 253.107273][T21625] ? ip6_output+0x210/0x210 [ 253.111794][T21625] ip6_local_out+0x124/0x1e0 [ 253.116367][T21625] ? __ip6_local_out+0x1a0/0x1a0 [ 253.121370][T21625] ip6_push_pending_frames+0xb6/0x170 [ 253.126723][T21625] icmpv6_push_pending_frames+0x1ff/0x210 [ 253.132489][T21625] icmp6_send+0xe3d/0x1260 [ 253.136980][T21625] ip6_link_failure+0x3b/0x1d0 [ 253.141736][T21625] ? ip6_negative_advice+0x260/0x260 [ 253.147014][T21625] sit_tunnel_xmit+0x8d4/0x11f0 [ 253.151860][T21625] xmit_one+0xf9/0x270 [ 253.155945][T21625] __dev_queue_xmit+0xcda/0x12a0 [ 253.160867][T21625] dev_queue_xmit+0x13/0x20 [ 253.165376][T21625] neigh_connected_output+0x264/0x290 [ 253.170731][T21625] ip6_finish_output2+0x8f5/0xa80 [ 253.175740][T21625] ip6_finish_output+0x428/0x480 [ 253.180694][T21625] ip6_output+0x10e/0x210 [ 253.185004][T21625] ? ip6_output+0x210/0x210 [ 253.189486][T21625] ip6_local_out+0x124/0x1e0 [ 253.194064][T21625] ? __ip6_local_out+0x1a0/0x1a0 [ 253.198984][T21625] ip6_push_pending_frames+0xb6/0x170 [ 253.204423][T21625] rawv6_sendmsg+0x1287/0x1330 [ 253.209172][T21625] ? __alloc_pages+0x194/0x320 [ 253.213916][T21625] ? kstrtoull+0x30e/0x350 [ 253.218315][T21625] inet_sendmsg+0x5f/0x80 [ 253.222626][T21625] __sys_sendto+0x2a8/0x370 [ 253.227194][T21625] ? __cond_resched+0x11/0x40 [ 253.231859][T21625] ? fput+0x2d/0x130 [ 253.235734][T21625] __x64_sys_sendto+0x74/0x90 [ 253.240390][T21625] do_syscall_64+0x4a/0x90 [ 253.244840][T21625] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 253.250794][T21625] RIP: 0033:0x4665d9 [ 253.254665][T21625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 253.274338][T21625] RSP: 002b:00007f1711f79188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 253.282991][T21625] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 253.290993][T21625] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 253.298947][T21625] RBP: 00007f1711f791d0 R08: 00000000200000c0 R09: 000000000000001c [ 253.307023][T21625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 19:55:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x4800000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 253.314974][T21625] R13: 00007ffee020149f R14: 00007f1711f79300 R15: 0000000000022000 [ 253.322930][T21632] CPU: 0 PID: 21632 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 253.331692][T21632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.341904][T21632] Call Trace: [ 253.345183][T21632] dump_stack+0x137/0x19d [ 253.349573][T21632] should_fail+0x23c/0x250 [ 253.353983][T21632] ? dup_mmap+0x38e/0x9c0 [ 253.358407][T21632] __should_failslab+0x81/0x90 [ 253.363222][T21632] should_failslab+0x5/0x20 [ 253.367731][T21632] kmem_cache_alloc+0x46/0x2f0 [ 253.372498][T21632] ? __vma_link_rb+0x3c2/0x3e0 [ 253.377257][T21632] ? up_write+0x25/0xc0 [ 253.381400][T21632] dup_mmap+0x38e/0x9c0 [ 253.385548][T21632] dup_mm+0x7c/0x210 [ 253.389524][T21632] copy_process+0x1203/0x2e00 [ 253.394199][T21632] kernel_clone+0x14b/0x680 [ 253.398762][T21632] __se_sys_clone3+0x194/0x1d0 [ 253.403622][T21632] ? ksys_write+0x148/0x180 [ 253.408125][T21632] ? fpregs_assert_state_consistent+0x7d/0x90 [ 253.414235][T21632] ? exit_to_user_mode_prepare+0x65/0x190 [ 253.419976][T21632] __x64_sys_clone3+0x2d/0x40 [ 253.424671][T21632] do_syscall_64+0x4a/0x90 [ 253.429094][T21632] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 253.435092][T21632] RIP: 0033:0x4665d9 [ 253.439027][T21632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 253.458654][T21632] RSP: 002b:00007fcbaf4ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 253.467073][T21632] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 253.475043][T21632] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000300 [ 253.483096][T21632] RBP: 00007fcbaf4ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 253.491476][T21632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 253.499445][T21632] R13: 00007ffc57d77b8f R14: 00007fcbaf4ff300 R15: 0000000000022000 [ 253.511640][ T1033] loop1: p1[EZD] p3 19:55:13 executing program 4 (fault-call:3 fault-nth:13): r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:13 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x78000000, 0xac141409}}, 0x1c) [ 253.515607][ T1033] loop1: p1 size 11290111 extends beyond EOD, truncated [ 253.527264][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 253.541263][T21626] loop1: p1[EZD] p3 [ 253.545217][T21626] loop1: p1 size 11290111 extends beyond EOD, truncated [ 253.552320][T21639] loop2: detected capacity change from 0 to 264192 19:55:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x4c00000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 253.571574][T21639] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 253.573275][T21655] FAULT_INJECTION: forcing a failure. [ 253.573275][T21655] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 253.587521][T21626] loop1: p3 size 1912633224 extends beyond EOD, [ 253.593756][T21655] CPU: 0 PID: 21655 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 253.593779][T21655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 19:55:13 executing program 1: syz_read_part_table(0xffffffffffffffff, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 253.593789][T21655] Call Trace: [ 253.593796][T21655] dump_stack+0x137/0x19d [ 253.600114][T21626] truncated [ 253.629762][T21655] should_fail+0x23c/0x250 [ 253.634232][T21655] should_fail_usercopy+0x16/0x20 [ 253.639257][T21655] _copy_to_user+0x1c/0x90 [ 253.643692][T21655] simple_read_from_buffer+0xab/0x120 [ 253.649084][T21655] proc_fail_nth_read+0xf6/0x140 [ 253.654060][T21655] ? rw_verify_area+0x136/0x250 [ 253.658904][T21655] ? proc_fault_inject_write+0x200/0x200 [ 253.664534][T21655] vfs_read+0x154/0x5d0 [ 253.668690][T21655] ? __fget_light+0x21b/0x260 [ 253.673415][T21655] ? __cond_resched+0x11/0x40 [ 253.678088][T21655] ksys_read+0xce/0x180 [ 253.682244][T21655] __x64_sys_read+0x3e/0x50 [ 253.686741][T21655] do_syscall_64+0x4a/0x90 [ 253.691159][T21655] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 253.697111][T21655] RIP: 0033:0x41935c [ 253.701001][T21655] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 19:55:13 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x7ffff000, 0xac141409}}, 0x1c) 19:55:13 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 253.720601][T21655] RSP: 002b:00007f1711f79170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 253.729008][T21655] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041935c [ 253.736984][T21655] RDX: 000000000000000f RSI: 00007f1711f791e0 RDI: 0000000000000005 [ 253.744954][T21655] RBP: 00007f1711f791d0 R08: 0000000000000000 R09: 000000000000001c [ 253.752927][T21655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 253.760898][T21655] R13: 00007ffee020149f R14: 00007f1711f79300 R15: 0000000000022000 [ 253.813358][T21665] loop1: detected capacity change from 0 to 264192 [ 253.869418][T21665] loop1: p1[EZD] p3 [ 253.873739][T21665] loop1: p1 size 11290111 extends beyond EOD, truncated [ 253.890376][T21665] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x80040200, 0xac141409}}, 0x1c) 19:55:14 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x6000000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x2, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:14 executing program 2: sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000280)=0x14) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@loopback, 0x0, r4}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000000)={@local, 0x0, r4}) sendmsg(r2, &(0x7f0000000740)={&(0x7f00000002c0)=@nl=@kern={0x10, 0x0, 0x0, 0x2000000}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)="d3bdc0bd936c45cb8542272c49c814efcc55a821c9498995872652c4a32d4031b2ea11347d2e6030daacdaa275ae226aeb1efc311de6d0b0c71816df7ad45f2dd192fa3e4b42b3fd2d050c803dcecedb23aba812ac2abb2e074b8ab0cc420b4c9a455e54ec12c0c95d6d13e1c2c1769a564e0f764399a0f192d59f2943dd80ac7da5b03c49887c93ef316ea4d5836ca96817da64a9dfef869e7096cfedc7d79dd6ce009ffdc53e0a5b323d4583bd29c3292dd6c195f99e0361666acfc09b94cf9c423e22a8364a839031be6d8f", 0xcd}, {&(0x7f0000000440)="2d552a639367cb84ac291416d02da1b63f58cb512cd0723651e06241ee000955eb95cd8bcb721c7f88fda0e32fbbf11694a5846020cc51e0c02581e434fd276290a5164c6ae035d036442f2afcc961f129630906e237", 0x56}, {&(0x7f00000004c0)="3eff0bb9b148cee905350c9629cf92fa5ebb2c7be7bc478a00a7a2a5d0127cf858360b166be4a3b05791720505d15b3866de24731c9a53503de641480a5b27690602a3d817029f9660fabebdcb12ea05c051d81d708b1c842fd4b1", 0x5b}, {&(0x7f0000000540)="aa0d9af92b74527c4e33010dbe76496f16b583db73750dbf9af0ccef2e3660dec9d2d6f86ac53a49f17140d6db5663e4ff15854d24117ad2a0c34f300c5c75c6fa7b3c4bfd405357852cebbc264112330199ee581781226c988e5a81cde479b94f30cced742acaa848369661ce3cae03ed17d19c890839ebd14ca6a27072c70aaf6e33b0c2c82e453a4987ca59be43db1d4158b5a05e73d17e11111c8db3f1cff7fc87c8b2d20d6be4983d08b3807df0f04299381bae750d554947f0e6fed6e4b90469160ed64616625f185a9468b8287e1c3fd70a819139b861701425df4ad0569e5f", 0xe3}], 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="2800000000000000a9f3c95e78bd7f05141b069a1001000099b0f31548b48aa89478ed1dfcec96df62c68740da773a8161f198bf60000000000000008400000004000000e02e4059002a479c1bc203194144e8e24699de9b58f18ee5145d86c5acd087e437cf95c2edf6d8999a4c0854ea871428eed3c573a5fd6658d01a658edac000d52add2706aebea6223307922d9aee0000480000000000000008010000f6770000355f947bb95f205416204731fc14fe0400000000000000d924145d5dfde17c88a9729008c76c4f00c6441b80"], 0xd0}, 0x4044004) writev(r5, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 19:55:14 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0301a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xa0050000, 0xac141409}}, 0x1c) 19:55:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x6800000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 254.109612][T21701] loop1: detected capacity change from 0 to 152833 19:55:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x3, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xc8050000, 0xac141409}}, 0x1c) 19:55:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x6c00000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 254.169448][T21701] loop1: p1[EZD] p3 [ 254.173531][T21701] loop1: p1 size 11290111 extends beyond EOD, truncated [ 254.182302][T21701] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:14 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:14 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0601a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x4, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 254.224688][T21727] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 19:55:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x7400000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xe0ffffff, 0xac141409}}, 0x1c) 19:55:14 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000140)=0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{}, {0x77359400}}, &(0x7f0000000080)) timer_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x3938700}}, &(0x7f0000000040)) 19:55:14 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x10, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x5, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 254.298909][T21743] loop1: detected capacity change from 0 to 152833 19:55:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xe8030000, 0xac141409}}, 0x1c) 19:55:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x7a00000000000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:14 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x2008000) write(r2, &(0x7f0000000400)="86", 0x1) io_submit(r1, 0x0, &(0x7f0000000040)) 19:55:14 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x11, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 254.359185][ T1033] loop1: p1[EZD] p3 [ 254.363370][ T1033] loop1: p1 size 11290111 extends beyond EOD, truncated [ 254.393813][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x6, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 254.413367][T21743] loop1: p1[EZD] p3 [ 254.417764][T21743] loop1: p1 size 11290111 extends beyond EOD, truncated [ 254.429514][T21743] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:14 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0701a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xeffdffff, 0xac141409}}, 0x1c) 19:55:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x8cffffff00000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x7, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:14 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x41, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:14 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000000)=""/32) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000340)=0x101) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="6d3006000000000000d2e56e79289b19d2bf642e2f2db8", 0x17}, {&(0x7f00000001c0)="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", 0x112}, {&(0x7f0000000140)="b45f6260e224c5a6e67ed2778cbfeb2958b0db04b021189dd9a0bb977f902f2824df9621d3ff424340327edc66f8459767b3b6bdd1772462fac6d9aa7b708aec9812648689c55beade1bb9b51d74b3346b986d3d46ac60a6ef6217929cc897bbf01eaa28bd4c243cce56803cefe71970b12fb37ddd31", 0x76}], 0x100000000000005c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x480041, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000300)=0x8) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, &(0x7f00000000c0)) 19:55:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xf4010000, 0xac141409}}, 0x1c) 19:55:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x8, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:14 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x60, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 254.609545][T21820] loop1: detected capacity change from 0 to 152833 [ 254.649230][T21820] loop1: p1[EZD] p3 19:55:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xf5ffffff, 0xac141409}}, 0x1c) [ 254.656178][T21820] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xf, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 254.702650][T21820] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:14 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0202a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfc000000, 0xac141409}}, 0x1c) 19:55:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xfeffffff00000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:14 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x10, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 254.851630][T21866] loop1: detected capacity change from 0 to 152834 19:55:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0xffffffff00000000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfe800000, 0xac141409}}, 0x1c) 19:55:14 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x1f00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 254.909281][T21866] loop1: p1[EZD] p3 [ 254.913541][T21866] loop1: p1 size 11290111 extends beyond EOD, truncated [ 254.929079][T21866] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x22, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:15 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0203a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:15 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfe80ffff, 0xac141409}}, 0x1c) 19:55:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x28, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:15 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 255.101813][T21914] loop1: detected capacity change from 0 to 152835 19:55:15 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfec0ffff, 0xac141409}}, 0x1c) 19:55:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x2c, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x30, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 255.193522][T21914] loop1: p1[EZD] p3 [ 255.197705][T21914] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:15 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfeffffff, 0xac141409}}, 0x1c) 19:55:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x58, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}, 0x22}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 255.254525][T21914] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x22, 'sysadm_u'}}]}) 19:55:15 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0204a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x60, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:15 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xff000000, 0xac141409}}, 0x1c) 19:55:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x2c, 'sysadm_u'}}]}) [ 255.473001][T21969] loop1: detected capacity change from 0 to 152836 [ 255.521391][T21969] loop1: p1[EZD] p3 [ 255.525453][T21969] loop1: p1 size 11290111 extends beyond EOD, truncated [ 255.536353][T21969] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:15 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x4100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x78, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:15 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x2b, 0x80000, 0x0) sendmsg$NL80211_CMD_VENDOR(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r0, 0x8, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x8}, @NL80211_ATTR_VENDOR_DATA={0x3d, 0xc5, "f83b6ef69ac09320566e75d0d9f097e47728883daae28ca7d45d4cc227e59e6f076d2cde358e8bfdcc3fc221be109f48d8697f2a4096f9e649"}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000810}, 0x44040) sendmsg$NL80211_CMD_SET_COALESCE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000e40)={0x28, r0, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing', 0x0, 0x0) lseek(r3, 0x0, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x1c003, 0x48) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(r4, 0x0, 0x20040010) sendmsg$NL80211_CMD_SET_PMK(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x900}, 0xc, &(0x7f00000002c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010037d0b42d3b0200002aabde1f68c3098d08000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000370000001400020110c12fe359c901ec47384564eca4d73d"], 0x3c}}, 0x20000004) r6 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) bind$inet6(r3, &(0x7f0000000140)={0xa, 0x4e22, 0x8b, @empty, 0xae8}, 0x1c) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080024bd7000fddbdf252100000008000300", @ANYRES32=r7, @ANYBLOB="080077d7fbfff1ff"], 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0xc4) sendmsg$NL80211_CMD_SET_KEY(r6, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000780)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="9106abb7d37932411e2c71fae7c310b389a7ff74e98674fbe3933dbe9d8c7e5201bf28c1627047ba5373eca8d452a9b071edc8cac398620c00c0681c5eb000a4b01a509972462c23ac61183f3bedb9374fe2ead320fa03adeb7517ae7a8e8107b88001df6f8c19008d375dca9159332d1868bcaf00"/137, @ANYRES32=r7, @ANYBLOB="9613000a00243c062bd5b4aabcf6198b9f6e66090020005080050009000100000005000000000000000a000400a7c5d43f7aa100070000bc0000000000173bb549fc7c000000000000b35e01b23950179ff2473953f65bbab64b8eff35a06f85482734c3d48974bf29b1005a77f898189b2a3897b6a2f7376cb4dc347c766851b9c029e880b219582ad1ff01190a052063b2cb7178694c106ef98280903a3ad475153452e544aa44d6dbde4732bd12ebff44870e792346486ec20f20f3fa1bb76c7f4fed6881382cf499cddb8e086293f26977d1e11e68c22162241b1fee31f85d25d4310802dcc97aa9f443c914"], 0x70}, 0x1, 0x0, 0x0, 0x4004005}, 0x4000030) sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, r0, 0x400, 0x50bd2c, 0x25dfdbff, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x0, 0xd}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x58}, 0x1, 0x0, 0x0, 0x20040840}, 0x4010) mq_open(&(0x7f0000000140)='%\x00', 0x40, 0x0, 0x0) 19:55:15 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xffff0000, 0xac141409}}, 0x1c) 19:55:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}, 0x22}]}) 19:55:15 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0206a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:16 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xffff80fe, 0xac141409}}, 0x1c) 19:55:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfc, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 256.059355][T22004] loop1: detected capacity change from 0 to 152838 [ 256.075077][T22008] SELinux: duplicate or incompatible mount options [ 256.082479][T22004] loop1: p1[EZD] p3 [ 256.088708][T22004] loop1: p1 size 11290111 extends beyond EOD, truncated [ 256.096115][T22007] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 19:55:16 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x6000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:16 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xffffc0fe, 0xac141409}}, 0x1c) 19:55:16 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="020ea5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 256.108344][T22004] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 256.136301][T22023] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 19:55:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/10, 0xa}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/219, 0xdb}], 0x3, 0x3ff, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="24000016210007041dfffd946f610100020000e8fe0208020801080008000300fd7f0000308025280000001100f7ffba164aab1c0000eff24d82387e2326e26a44c99af286e4040000000000000000", 0x4f}], 0x1}, 0x0) 19:55:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x103, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:16 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfffffdef, 0xac141409}}, 0x1c) 19:55:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x1f4, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:16 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xffffff7f, 0xac141409}}, 0x1c) [ 256.237784][T22049] SELinux: duplicate or incompatible mount options [ 256.239846][T22045] loop1: detected capacity change from 0 to 152846 19:55:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x2}) 19:55:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x220, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 256.289419][T22045] loop1: p1[EZD] p3 [ 256.293470][T22045] loop1: p1 size 11290111 extends beyond EOD, truncated [ 256.301671][T22045] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 256.351734][T22075] SELinux: duplicate or incompatible mount options 19:55:16 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x8fff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:16 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="020fa5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:16 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xffffffe0, 0xac141409}}, 0x1c) 19:55:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x300, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x3}) 19:55:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x301, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:17 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfffffff5, 0xac141409}}, 0x1c) 19:55:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x4}) [ 257.022706][T22104] SELinux: duplicate or incompatible mount options [ 257.033330][T22107] loop1: detected capacity change from 0 to 152847 19:55:17 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0xff8f, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:17 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfffffffe, 0xac141409}}, 0x1c) [ 257.089041][T22107] loop1: p1[EZD] p3 [ 257.093207][T22107] loop1: p1 size 11290111 extends beyond EOD, truncated [ 257.108553][T22107] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 257.124983][T22127] SELinux: duplicate or incompatible mount options 19:55:17 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0210a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x3e8, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x5}) 19:55:17 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x17000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x500, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:17 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x10000000000, 0xac141409}}, 0x1c) [ 257.265339][T22156] loop1: detected capacity change from 0 to 152848 [ 257.293917][T22158] SELinux: duplicate or incompatible mount options [ 257.302588][T22156] loop1: p1[EZD] p3 [ 257.307425][T22156] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x5a0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 257.315818][T22156] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:17 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="021ba5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x6}) 19:55:17 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x7ffffffff000, 0xac141409}}, 0x1c) 19:55:17 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x20010, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x5c8, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 257.400181][T22183] SELinux: duplicate or incompatible mount options 19:55:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x7}) 19:55:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x600, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 257.473928][T22193] loop1: detected capacity change from 0 to 152859 19:55:17 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xffff00000000, 0xac141409}}, 0x1c) 19:55:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 257.531257][T22207] SELinux: duplicate or incompatible mount options [ 257.541518][T22193] loop1: p1[EZD] p3 [ 257.550022][T22193] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:17 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x20200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 257.575030][T22193] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x8}) 19:55:17 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x4000000000000, 0xac141409}}, 0x1c) 19:55:17 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="02fea5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x700, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:17 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x80000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:17 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x10000000000000, 0xac141409}}, 0x1c) [ 257.719163][T22238] SELinux: duplicate or incompatible mount options 19:55:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x810, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x9}) 19:55:17 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x40030000000000, 0xac141409}}, 0x1c) [ 257.782516][T22251] loop1: detected capacity change from 0 to 153086 19:55:17 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xf00, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 257.876786][T22270] SELinux: duplicate or incompatible mount options [ 257.878958][T22251] loop1: p1[EZD] p3 [ 257.906051][T22251] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:17 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xf0ff7f00000000, 0xac141409}}, 0x1c) [ 257.959063][T22251] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:17 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf08000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x1008, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xa}) 19:55:17 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x101000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:18 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xf0ffffff7f0000, 0xac141409}}, 0x1c) 19:55:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x1100, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 258.091166][T22309] SELinux: duplicate or incompatible mount options [ 258.092559][T22312] loop1: detected capacity change from 0 to 144641 [ 258.128974][T22312] loop1: p1 p3 [ 258.132690][T22312] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:18 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x17f000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 258.144085][T22312] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xb}) 19:55:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:18 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbffa000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:18 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x100000000000000, 0xac141409}}, 0x1c) 19:55:18 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x209b1e, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x2002, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:18 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x103000000000000, 0xac141409}}, 0x1c) 19:55:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 258.296391][T22350] SELinux: duplicate or incompatible mount options [ 258.313517][T22351] loop1: detected capacity change from 0 to 79105 19:55:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xc}) 19:55:18 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbfe00f0000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x2800, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 258.359013][T22351] loop1: p1 p3 [ 258.362648][T22351] loop1: p1 size 11290111 extends beyond EOD, truncated [ 258.376559][T22351] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:18 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x200000000000000, 0xac141409}}, 0x1c) 19:55:18 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x400000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 258.449982][T22381] SELinux: duplicate or incompatible mount options 19:55:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x3000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:18 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x600000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xd}) 19:55:18 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x300000000000000, 0xac141409}}, 0x1c) [ 258.508735][T22396] loop1: detected capacity change from 0 to 264192 [ 258.538884][T22396] loop1: p1 p3 [ 258.542456][T22396] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 258.556560][T22396] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x3f00, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xe}) [ 258.583181][T22420] SELinux: duplicate or incompatible mount options [ 258.604086][T22396] loop1: detected capacity change from 0 to 264192 19:55:18 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf70ee4b00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:18 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x400000000000000, 0xac141409}}, 0x1c) 19:55:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:18 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x700100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x4000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 258.676183][T22439] SELinux: duplicate or incompatible mount options [ 258.683544][T22396] loop1: p1 p3 [ 258.687500][T22396] loop1: p1 size 11290111 extends beyond EOD, truncated [ 258.696391][T22396] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x10}) 19:55:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x5800, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 258.791755][T22463] SELinux: duplicate or incompatible mount options [ 258.800811][T22407] print_req_error: 46 callbacks suppressed [ 258.800823][T22407] blk_update_request: I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 258.800830][T22403] blk_update_request: I/O error, dev loop1, sector 264033 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 258.800888][ T851] blk_update_request: I/O error, dev loop1, sector 264033 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 19:55:18 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0xf01700, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 258.806670][ T1794] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 258.818287][ T851] buffer_io_error: 35 callbacks suppressed [ 258.818296][ T851] Buffer I/O error on dev loop1p3, logical block 263808, async page read [ 258.864059][ T851] blk_update_request: I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 258.875467][ T851] Buffer I/O error on dev loop1p1, logical block 33008, async page read 19:55:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x11}) [ 258.883864][ T851] blk_update_request: I/O error, dev loop1, sector 264034 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 258.895210][ T851] Buffer I/O error on dev loop1p3, logical block 263809, async page read [ 258.903664][ T851] blk_update_request: I/O error, dev loop1, sector 264035 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 258.915158][ T851] Buffer I/O error on dev loop1p3, logical block 263810, async page read [ 258.923693][ T851] blk_update_request: I/O error, dev loop1, sector 264036 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 258.935007][ T851] Buffer I/O error on dev loop1p3, logical block 263811, async page read [ 258.943524][ T851] blk_update_request: I/O error, dev loop1, sector 264037 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 258.954838][ T851] Buffer I/O error on dev loop1p3, logical block 263812, async page read [ 258.963284][ T851] blk_update_request: I/O error, dev loop1, sector 264038 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 258.971680][T22476] SELinux: duplicate or incompatible mount options [ 258.974590][ T851] Buffer I/O error on dev loop1p3, logical block 263813, async page read 19:55:19 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x1000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x12}) [ 258.989711][ T851] blk_update_request: I/O error, dev loop1, sector 264039 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 259.001056][ T851] Buffer I/O error on dev loop1p3, logical block 263814, async page read [ 259.009598][ T851] Buffer I/O error on dev loop1p3, logical block 263815, async page read 19:55:19 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x500000000000000, 0xac141409}}, 0x1c) [ 259.040373][T22484] loop1: detected capacity change from 0 to 206081 [ 259.091997][T22493] SELinux: duplicate or incompatible mount options [ 259.101396][T22484] loop1: p1 p3 [ 259.105288][T22484] loop1: p1 start 4915200 is beyond EOD, truncated [ 259.112010][T22484] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 259.126599][ T1033] loop1: p1 p3 19:55:19 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a020000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x6000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:19 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x600000000000000, 0xac141409}}, 0x1c) 19:55:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x25}) 19:55:19 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x10000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 259.138087][ T1033] loop1: p1 start 4915200 is beyond EOD, truncated [ 259.144647][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:19 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x700000000000000, 0xac141409}}, 0x1c) [ 259.262980][T22528] loop1: detected capacity change from 0 to 136449 [ 259.270261][T22529] SELinux: duplicate or incompatible mount options 19:55:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x48}) 19:55:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x7800, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:19 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x11000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x4c}) [ 259.309133][T22528] loop1: p1 p3 [ 259.313176][T22528] loop1: p1 size 11290111 extends beyond EOD, truncated [ 259.338780][T22528] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 259.349246][T22546] SELinux: duplicate or incompatible mount options 19:55:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:19 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a030000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:19 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x800000000000000, 0xac141409}}, 0x1c) [ 259.441911][T22556] SELinux: duplicate or incompatible mount options 19:55:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x80fe, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:19 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x1e9b2000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x60}) 19:55:19 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xf00000000000000, 0xac141409}}, 0x1c) 19:55:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xa005, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 259.578722][T22582] loop1: detected capacity change from 0 to 128257 19:55:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xc805, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 259.618866][T22586] SELinux: duplicate or incompatible mount options 19:55:19 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x68}) [ 259.660068][T22582] loop1: p1 p3 [ 259.663919][T22582] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:19 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x1000000000000000, 0xac141409}}, 0x1c) [ 259.704696][T22582] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 259.765001][T22612] SELinux: duplicate or incompatible mount options [ 259.781442][ T851] Buffer I/O error on dev loop1p1, logical block 128128, async page read [ 259.790306][T22582] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 259.821683][T22582] loop1: detected capacity change from 0 to 128257 [ 259.879798][T22582] loop1: p1 p3 [ 259.883385][T22582] loop1: p1 size 11290111 extends beyond EOD, truncated [ 259.890938][T22582] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:19 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a040000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xe803, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:19 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x1008000000000000, 0xac141409}}, 0x1c) 19:55:19 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x41000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x6c}) 19:55:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x74}) [ 259.983845][T22644] SELinux: duplicate or incompatible mount options 19:55:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:20 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0xf5ffffff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:20 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x1100000000000000, 0xac141409}}, 0x1c) [ 260.050147][T22643] loop1: detected capacity change from 0 to 120065 [ 260.067116][T22670] SELinux: duplicate or incompatible mount options 19:55:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x7a}) 19:55:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xf401, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 260.100530][T22643] loop1: p1 p3 [ 260.104236][T22643] loop1: p1 size 11290111 extends beyond EOD, truncated [ 260.127540][T22643] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 260.165471][T22685] SELinux: duplicate or incompatible mount options [ 260.189482][T22643] loop1: detected capacity change from 0 to 120065 19:55:20 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a050000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:20 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x2001001000000000, 0xac141409}}, 0x1c) 19:55:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfc00, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000080)) 19:55:20 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0xff8f0000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 260.228941][T22643] loop1: p1 p3 [ 260.232479][T22643] loop1: p1 size 11290111 extends beyond EOD, truncated [ 260.239885][T22643] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:20 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0xfffffff5, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:20 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x2002000000000000, 0xac141409}}, 0x1c) 19:55:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfe80, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 260.287747][T22711] SELinux: duplicate or incompatible mount options [ 260.322778][T22721] SELinux: duplicate or incompatible mount options 19:55:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/43, 0x2b) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646566636f6e746578743d73797374656d5f752c636f6e746578743d73797361646d5f752c00a39d0bbd279aaa0ea69cc151432d206d8d50ece647be6add83eb757a342147a4a9b9ef1492e9ce9932cf2fee5e908b5e3ed9535a19bf61c2b73cd8ddba40a821878d785642526fe7b0323f1224f080ef4b3c45b6d677a50e033c1b34d8d8f5ea1078dbcd7cc40a9c1d0ed7a516f70e16dfa17e85f46d4799ab782f727c14fd1b3734"]) 19:55:20 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x100000800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 260.407218][T22737] loop1: detected capacity change from 0 to 111873 [ 260.421287][T22745] SELinux: duplicate or incompatible mount options [ 260.459007][ T1033] loop1: p1 p3 [ 260.462536][ T1033] loop1: p1 size 11290111 extends beyond EOD, truncated [ 260.470027][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 260.480099][T22737] loop1: p1 p3 [ 260.483678][T22737] loop1: p1 size 11290111 extends beyond EOD, truncated [ 260.491285][T22737] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 260.542017][T22737] loop1: detected capacity change from 0 to 111873 19:55:20 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a060000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:20 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x2800000000000000, 0xac141409}}, 0x1c) 19:55:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xff00, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:20 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x24280, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x141002, 0x100, 0x6}, 0x18) dup3(r1, r0, 0x80000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:20 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x1b1201f000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 260.598988][T22737] loop1: p1 p3 [ 260.602591][T22737] loop1: p1 size 11290111 extends beyond EOD, truncated [ 260.610277][T22737] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 260.619866][ T1033] loop1: p1 p3 [ 260.623419][ T1033] loop1: p1 size 11290111 extends beyond EOD, truncated [ 260.632153][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x20480, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:20 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x400000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:20 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x3000000000000000, 0xac141409}}, 0x1c) 19:55:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646566636f6e746578743d73797300295d88f26eab2aa8cf3674656d5f752c236f6e74657874"]) [ 260.709116][T22790] SELinux: duplicate or incompatible mount options [ 260.730165][T22784] loop1: detected capacity change from 0 to 103681 19:55:20 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a070000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x34000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:20 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x3f00000000000000, 0xac141409}}, 0x1c) 19:55:20 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x7fb07b4bf000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 260.786242][T22784] loop1: p1 p3 [ 260.792425][T22784] loop1: p1 size 11290111 extends beyond EOD, truncated [ 260.807918][T22784] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0xc1, 0x100) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) lsetxattr$security_selinux(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000002400), 0x1, 0x0) r3 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r3, 0x409, 0x0) r4 = fsopen(&(0x7f0000002440)='ufs\x00', 0x0) r5 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r5, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r5, 0x409, 0x0) r6 = getpid() tkill(r6, 0x1000000000015) r7 = getgid() sendmmsg$unix(r0, &(0x7f0000002540)=[{&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000280)="a6fab2c71937d69ef0dc6a9cefcf081e2bf8e164ef73f5242d44acbfed09fc3094bcf4ecb813f6a91e12bd79d6687a515f3b9eb3aa23c82a3190d931c0029f2a045e5ed5470d07b5fa00214a27372b2df869c968e057cc34d85a39adc246f5ef3a9f06d48b07c518b66281a8418706879778c386d1bea3020fa4bcf3bd9ab370ad40a05a4a5f4bca7a00959904d1f5a57fe0340a7b251ba3cc89d0ce7b542206dbfcd53e7a861911a307c80672c174d45eccfc863316f5ff10ec8892288627", 0xbf}, {&(0x7f0000000340)="d5f9c0a70fbb10c87545f01ac567ee9b03b979fa0e524eb6be1207aa9d6a4335d38e51aed32f6f277237bad5f2730c792e4866a259f5506597a00112c57ec90a858ef8bd3d012c2129cdb2b7c99ecd7da0c9bf284eb6406e615e093769b4975b6b5e79ec8f2c59d9180a583f947c2f47fdc001772de47cd234e9799d6883af9053cf6f", 0x83}], 0x2, 0x0, 0x0, 0x50}, {&(0x7f0000000440)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000640)=[{&(0x7f00000004c0)="af98e52d07d7cd33d2ffca6ae7a9942d995a75b38812e7ac67ec0e930c6981db5638957cd8c45b393f8455b71b2468143ecfb5eaae62b538b610a37460c34c5d6803178a4ef6319f0438c75236b52e7a5c2586ffb04855b7409e1221f12d41a8685bd07aa0edad4faf9f1c41c9ec185082ff5df977b1a855480054dad27562ea78d2a2b009c0c78426f28807ddb4ecf8f9c0b4ce3a4e00889de997fe1e4e8024d0d8615a979bcfb4ead451d4d98ea9e6f80a131662df2776f8e7d535b328660f79d39db01b39b6aa39bc3e", 0xcb}, {&(0x7f00000005c0)="6c701020ce3d484e427e161a18ce9853bd1e2bab8b4dc6455ca1a0f52958d464af1a235f5832f9de1a14b6a795ca76d4ad2dcabee0ce3114aff2202ea3ee86a067823fa4bc1372b496bb3dcf2f5e26dc964d41900393c6468bbe15e13e6dceaa1d2cff1e63c60cb2f51b3b", 0x6b}], 0x2, &(0x7f0000000840)=[@rights={{0x24, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, r0]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}], 0x78, 0x800}, {&(0x7f00000008c0)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000000940)="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", 0x1000}, {&(0x7f0000001940)="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", 0xfa}, {&(0x7f0000001a40)="8714adddc4e2a30c1fd67671b3a212f1bca1635359a344f2f10100b5efe272bdde50284e346846ee490f3ef040f54bbd11da53d5652c598d947bb7edb1de866c898c165d6adcd997e01f610711eaf0a86bb617492b49cf5aec5f7a8760089744058b8fc8f04d35d9b0", 0x69}], 0x3, &(0x7f0000001b00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r0, r0, r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0]}}, @cred={{0x1c}}], 0x90, 0x20000804}, {&(0x7f0000001bc0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000002200)=[{&(0x7f0000001c40)="b643144265fe0f836cfb40b8b4ad5f2da02da679cf7a91fe91fb274ee4d7e955", 0x20}, {&(0x7f0000001c80)="05a9ed2893c5cfbe81cf563ecaab026830d2e7d7fbaac8b2eb045c96c4a4ed724a25ca1cd69093f98c6f52aee8c178f136bf563c178da51f062b540129177aa75fca7fc6a6ac6367e25895a7760aee27aad9dbbaaf883a4f55e127c44e43c5e6a54db0f11935323c3fd01232590d648f85a9a32cc204abe966c5262b229cf72c36eb667026e9f9a53c6badc18c2662222cf5e908bc2cf3b394cb7ebd1966640bd353395d27196d7049f0ef28d65b2134bf8447e1a932c679e09eda5b64c6a18c12bfaf69adc4d1fc85be3ca0aa59f52192dbc87eeca62421f8d7cc4af0ca4b9cc2ed9ec741a4d9d2435bafbe118a66dd9bff33", 0xf3}, {&(0x7f0000001d80)="53f427a8df76d22b036e1c2b909f0abb07e6f16dc779d7cbd52fca8555b85a33c56911fcf6ce846d62f796e7abd967c15ad8407aa5611f6f4164b7ed523a99ce90d7184f04b864d8dc8816f346b92282432d95f3d480e314da362a95e2761c", 0x5f}, {&(0x7f0000001e00)="7f55747e6bcc59419cfc18b2367ba72f7a2f7544e83054ee8eb6dc68c260b52ce2364c7e721e0ec498b190d19d3f3d110bb9d3c8a4ed42e721f4043b2b", 0x3d}, {&(0x7f0000001e40)="33623f2368f34d6f3d2bd881b3d7b5ccc31be8d3cfc06d6de95bfcd665fb2b5a48464ec2d1b6e831498b5b23c3580e592e045977a887a016b8906608f281920746471b539efd1890cbd9cf2c5e891ab60771c3865d09ccc8d910d4132be0f74c59d97b", 0x63}, {&(0x7f0000001ec0)="30aeec2e7f6145f8dd8d29e530b417c65d59c1ddb89249119757d392c7823a6e960c22a4825b256c0c0a9af74a17c6859997de725f9f2eb1414dd20e06c618628483cab5fdd6a6940e498cc5ae3159927e55589084444b1daa91116cdc2ade6407e0df17bd753becc9860dd5933f296d35891384d3135dff2d9333d6c53ae9d6a39f1359d2b3f85559429b35e53540eb0f4484efeda75f435e433c5fbbfcdf1f95a1", 0xa2}, {&(0x7f0000001f80)="aae78edc5bbbc909b62d571af74818e68709ee260baeebdf361795a712bb994c150c97376b2b5b78a8cf36456ddaedb71d276e42741e55307b14a0b4d6011f018cf2ec27cf73f308a779011f4486b4e28b58523daf82862fdcedc115a01c136dfc2c9851403d4802517675d6ef33331029930b72bd2b0341957bb8526f19704666561a0e1c15103372dc309029e8ea226e024a8e04e266413ae211225b857d39a044088384a882cc17517e3f2082fd325e35f98835f16b3c815d", 0xba}, {&(0x7f0000002040)="81e8308fff52049bffd8e6b4f5b394d26534cf18a90055db8204a417ad8b65cc71be5d3ad5b7d76e0dd938e5aa2a3a5a8d65936c81892d72929fed4a0d1c732538caa8102aa371f43710e09f11ba55bf379317d7b5eccc5bb1304774838798b6f460ca1c03b01da13a2330c8676c8336c898020e76c2c41aa277d9ebc6ddfbde1f6abf555d65804e2ef21ed4685787d5ca065b2c016a505a31b217", 0x9b}, {&(0x7f0000002100)="705c705e3595630d1e01cb6a59fe9d5a2ffffb18ead2f758f399868b0bd4075fa7207b8e56d381a164a1c2847bea1d1bce0b007f7939e7e82255633063d16ff4c05b02b81681f81d019576a5ec9e44aed9fb6b5a9065803b54dd5d249d20b9812d2c4f025e77571286b11b22205447bab5c278397a79a197aad72ec65b20238cc0b776e890f585b50bf0d2cc1b6a9d4623433fd15e8cec1605aa7c139f50472fae04108a3b3a008fd2b93741d146dc8b72ccb6bc0ff42ed4358260143abf03199b34d6f40952", 0xc6}], 0x9, &(0x7f0000002480)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r1, 0xee00}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r2, r0, r0, r3, 0xffffffffffffffff, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, r7}}}], 0x90, 0x40800}], 0x4, 0xc000) fspick(r0, &(0x7f00000000c0)='./file0\x00', 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646566636f6e746578743d73797374656d5f752c636f6e926578743d73797361646d5f752c00"]) 19:55:20 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x4000000000000000, 0xac141409}}, 0x1c) 19:55:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x40000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:20 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x2001000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 260.963544][T22843] loop1: detected capacity change from 0 to 95489 19:55:21 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x100000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 261.023442][ T1033] loop1: p1 p3 [ 261.026991][ T1033] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:21 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x5800000000000000, 0xac141409}}, 0x1c) 19:55:21 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x400300, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 261.075414][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 261.085645][T22843] loop1: p1 p3 [ 261.089967][T22843] loop1: p1 size 11290111 extends beyond EOD, truncated [ 261.137766][T22843] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 261.232504][T22843] loop1: detected capacity change from 0 to 95489 [ 261.269039][T22843] loop1: p1 p3 [ 261.272646][T22843] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:21 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a080000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:21 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x2020000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:21 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x6000000000000000, 0xac141409}}, 0x1c) 19:55:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 261.280383][T22843] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 261.408528][T22921] loop1: detected capacity change from 0 to 87297 [ 261.429839][T22921] loop1: p1[EZD] p3 [ 261.433959][T22921] loop1: p1 size 11290111 extends beyond EOD, truncated [ 261.442010][T22921] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x20000, 0x100) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000240)=""/18, 0x12}, {&(0x7f0000000280)=""/79, 0x4f}, {&(0x7f0000000300)=""/210, 0xd2}], 0x3, 0x8, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x27, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x50001, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1000008, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@posixacl}, {@version_u}, {@version_9p2000}, {@mmap}], [{@dont_hash}, {@appraise}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, '*{{'}}, {@obj_type={'obj_type', 0x3d, '%}::'}}, {@subj_user={'subj_user', 0x3d, 'system_u'}}]}}) 19:55:23 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xf0ff7f, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:23 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x7800000000000000, 0xac141409}}, 0x1c) 19:55:23 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x8000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:23 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:23 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a0a0000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:24 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x8000000000000000, 0xac141409}}, 0x1c) [ 264.008054][T22942] SELinux: duplicate or incompatible mount options [ 264.025013][T22944] loop1: detected capacity change from 0 to 70913 19:55:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x1000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:24 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x8000001000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 264.052120][T22942] 9pnet: Insufficient options for proto=fd [ 264.068068][T22942] SELinux: duplicate or incompatible mount options 19:55:24 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r1, 0x409, 0x0) fsetxattr$security_evm(r1, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="040e52175e7f5041af15f77890d5496e8ed2e18af5bdaaddfd4b2d6b6123cdb198331428fef84f9d833df72bb69edc94b7b3a25f04fd5e6a81375f293ffb3bc5d7fa1847b601efd337f0f3bfd110"], 0xd, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x40000, &(0x7f0000000080)={[], [{@subj_user={'subj_user', 0x3d, 'sysadm_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) fcntl$addseals(r1, 0x409, 0xc) 19:55:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x8004020000000000, 0xac141409}}, 0x1c) 19:55:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x1030000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 264.112077][T22944] loop1: p1 p3 [ 264.116407][T22944] loop1: p1 size 11290111 extends beyond EOD, truncated [ 264.144028][T22944] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x2000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xa005000000000000, 0xac141409}}, 0x1c) 19:55:24 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 264.254693][T22944] loop1: detected capacity change from 0 to 70913 [ 264.283368][T22944] loop1: p1 p3 [ 264.287259][T22944] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:24 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a0b0000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:24 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x10000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:24 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000080)=""/115, 0x73}, {&(0x7f0000000100)=""/8, 0x8}, {&(0x7f0000000180)=""/230, 0xe6}, {&(0x7f0000000280)=""/47, 0x2f}, {&(0x7f00000002c0)=""/91, 0x5b}, {&(0x7f0000000340)=""/17, 0x11}, {&(0x7f0000000380)=""/74, 0x4a}], 0x7, 0x0, 0x401) 19:55:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x3000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xc805000000000000, 0xac141409}}, 0x1c) [ 264.305749][T22944] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xe0ffffff00000000, 0xac141409}}, 0x1c) 19:55:24 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x4000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:24 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x10100000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000180)=""/153, 0x99}, {&(0x7f0000000240)=""/206, 0xce}, {&(0x7f00000000c0)=""/75, 0x4b}, {&(0x7f0000000340)=""/223, 0xdf}, {&(0x7f0000000440)=""/195, 0xc3}], 0x5, 0x1000, 0x9) [ 264.420243][T23031] SELinux: duplicate or incompatible mount options [ 264.450226][T23031] SELinux: duplicate or incompatible mount options [ 264.462481][T23033] loop1: detected capacity change from 0 to 62721 19:55:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xe803000000000000, 0xac141409}}, 0x1c) [ 264.491303][T23048] SELinux: duplicate or incompatible mount options [ 264.508611][T23033] loop1: p1 p3 [ 264.512505][T23033] loop1: p1 size 11290111 extends beyond EOD, truncated [ 264.520154][T23048] SELinux: duplicate or incompatible mount options [ 264.528880][T23033] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:24 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a180000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x5000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:24 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x209b1e00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xeffdffff00000000, 0xac141409}}, 0x1c) 19:55:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x20000, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f0000085000/0x4000)=nil, 0x4000, 0x100000a, 0x4010, r1, 0x33d1b000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x20, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x3ff, 0x60}}}}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x20040080}, 0x40) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) finit_module(r1, &(0x7f0000000440)='subj_type', 0x4) r5 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$addseals(r2, 0x409, 0x1) fcntl$setown(r2, 0x8, r5) setreuid(0x0, r4) getresuid(&(0x7f0000000080), &(0x7f0000000480), &(0x7f00000004c0)=0x0) r7 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='uid>', @ANYRESDEC=r6, @ANYBLOB=',su=/^\\,\x00\x00\x00\x00\x00']) preadv(r7, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/147, 0x93}, {&(0x7f00000002c0)=""/124, 0x7c}, {&(0x7f0000000340)=""/80, 0x50}], 0x4, 0x1000401, 0xffff) [ 264.631343][T23074] loop1: detected capacity change from 0 to 264192 19:55:24 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x60000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x6000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xf401000000000000, 0xac141409}}, 0x1c) [ 264.671856][ T1033] loop1: p1 p3 [ 264.675439][ T1033] loop1: p1 size 11290111 extends beyond EOD, truncated [ 264.696949][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r1, 0x409, 0x0) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x200000, 0x108) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f0000000100)) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/10, 0xa}, {&(0x7f00000000c0)=""/20, 0x14}, {&(0x7f0000000180)=""/156, 0x9c}, {&(0x7f0000000240)=""/128, 0x80}, {&(0x7f00000002c0)=""/192, 0xc0}], 0x5, 0x9, 0x6fe) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 264.721416][T23074] loop1: p1 p3 [ 264.725308][T23074] loop1: p1 size 11290111 extends beyond EOD, truncated [ 264.733757][T23074] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xf5ffffff00000000, 0xac141409}}, 0x1c) 19:55:24 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a1c0000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x7000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 264.814444][T23074] loop1: detected capacity change from 0 to 264192 19:55:24 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x70010000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000, 0xac141409}}, 0x1c) 19:55:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x8000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 264.887655][T23121] SELinux: duplicate or incompatible mount options [ 264.909586][T23131] loop1: detected capacity change from 0 to 264192 19:55:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646566636f6e746578743d73797374656d5f752c636f6e746578743d73017361646d5f752c00"]) 19:55:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xf000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 264.949468][T23131] loop1: p1 p3 [ 264.959944][T23131] loop1: p1 size 11290111 extends beyond EOD, truncated [ 264.975964][T23131] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:25 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfe80000000000000, 0xac141409}}, 0x1c) 19:55:25 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0xf001121b000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:25 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfe80ffff00000000, 0xac141409}}, 0x1c) [ 265.022691][T23157] SELinux: duplicate or incompatible mount options 19:55:25 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r1, 0x409, 0x0) preadv(r1, &(0x7f00000001c0), 0x0, 0xd9f, 0x0) dup3(r1, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, ["", ""]}, 0x1c}}, 0x10) 19:55:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x10000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:25 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0xf0170000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:25 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0xac141409}}, 0x1c) 19:55:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 265.184146][T23182] loop1: detected capacity change from 0 to 264192 [ 265.215461][T23186] SELinux: duplicate or incompatible mount options [ 265.230705][T23182] loop1: p1 p3 19:55:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x10000120, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 265.235597][T23182] loop1: p1 size 11290111 extends beyond EOD, truncated [ 265.267154][T23182] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:25 executing program 0: renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:25 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfeffffff00000000, 0xac141409}}, 0x1c) 19:55:25 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0afe0000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:25 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0xf04b7bb07f0000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x10080000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:25 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xff00000000000000, 0xac141409}}, 0x1c) [ 265.385438][T23220] SELinux: duplicate or incompatible mount options [ 265.416003][T23229] SELinux: duplicate or incompatible mount options 19:55:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0), 0xd79, 0x501000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x835fc, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646566636f8f7465787441e09b0c34718b1aa8ea6132dc473f093d737973396a6d5f752c636f6e746578743d73797361646d5f750900"]) 19:55:25 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 265.440710][T23222] loop1: detected capacity change from 0 to 185601 [ 265.478391][T23222] loop1: p1 p3 [ 265.482326][T23222] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:25 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xffff000000000000, 0xac141409}}, 0x1c) 19:55:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x11000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 265.497689][T23222] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x20010010, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:25 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x1100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 265.540394][ T1033] loop1: p1 p3 [ 265.544136][ T1033] loop1: p1 size 11290111 extends beyond EOD, truncated [ 265.578261][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 265.642800][T23222] loop1: detected capacity change from 0 to 185601 [ 265.678293][T23222] loop1: p1 p3 [ 265.681891][T23222] loop1: p1 size 11290111 extends beyond EOD, truncated 19:55:25 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a040200ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000080)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, ',[\'..){,.'}}]}) 19:55:25 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xffffff7f00000000, 0xac141409}}, 0x1c) 19:55:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x20020000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:25 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x1f00000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 265.689269][T23222] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 265.698021][ T1033] loop1: p1 p3 [ 265.701719][ T1033] loop1: p1 size 11290111 extends beyond EOD, truncated [ 265.709238][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:25 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xffffffff00000000, 0xac141409}}, 0x1c) [ 265.784107][T23305] SELinux: duplicate or incompatible mount options 19:55:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x28000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:25 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x4100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:25 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xa}}, 0x1c) 19:55:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000080)=""/50, 0x32}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/181, 0xb5}, {&(0x7f00000000c0)=""/81, 0x51}], 0x4, 0x3, 0x1ff) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) r5 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000380), 0x2, 0x0) r6 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000400), 0x163440, 0x0) dup2(r6, r4) r7 = syz_io_uring_setup(0x220c, &(0x7f00000001c0), &(0x7f0000ff9000/0x6000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r7, 0xa, 0x0, r8) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, r9) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, r9) syz_io_uring_submit(r1, 0x0, &(0x7f00000003c0)=@IORING_OP_FSYNC={0x3, 0x2, 0x0, @fd=r5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r8}}, 0x40) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="646566630700746578743d73797374426d5f752c636281beaf736f6e746578743d73797361646d5f752c00"]) r10 = socket$netlink(0x10, 0x3, 0x8) preadv2(r10, &(0x7f0000001840)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000001900)=""/225, 0xe1}, {&(0x7f0000000480)=""/68, 0x44}, {&(0x7f0000000500)=""/204, 0xcc}, {&(0x7f0000000600)=""/13, 0xd}, {&(0x7f0000000640)=""/97, 0x61}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/156, 0x9c}, {&(0x7f0000001780)=""/157, 0x9d}], 0x9, 0x5f3c, 0xfff, 0x8) [ 265.867286][T23331] loop1: detected capacity change from 0 to 120065 [ 265.938724][T23331] loop1: p1 p3 [ 265.942444][T23331] loop1: p1 start 131072 is beyond EOD, truncated [ 265.948954][T23331] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:26 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0xf5ffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x30000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:26 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xb}}, 0x1c) 19:55:26 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000300ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) statfs(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=""/194) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) preadv(r1, &(0x7f0000000680), 0x0, 0x5, 0x3) sendmsg(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="07202a45b83813383100533509bec6dc74f9c0bce90dcff93acf79d85008bf3a7693cbabab8268778f547952e92b8ab50cd7ae1c2d6fd5181853751f5e8665ea11b409a706534c2732f41dbc6ca8db01f21e10a5e42e06bc49e4f48b6a9b41ea1044ba85f26a9431eeb0cb394b4579acbd82c85a2a0916bfc3e47b", 0x7b}], 0x1, &(0x7f0000000180)=[{0x30, 0x1, 0x8000, "28797adaf7be0f3c34f68eb0472cdee152b6adec3c75eedf2f21ad3d35b9"}, {0xe0, 0x100, 0x4, "0ffbdbdd79ff31afa6b3dfdc48924abe131fc6834355d02fcfc0834fd0238c6832d28b74b1cc77da43eab2a210d0341c24ee4ef9e14540b5bec147bbff9cc9179f54986a5af98588075fc705f4e3e720af65878b2b6b5c67a08ec7710dca1131c04ccad46adcefb62e0ffeb3af735798e01e767e4e58ca9c187c1d004297b110ecddbb1d425010e1750d6523740feba2a5acb60167d2b91d1f844e3e750e038b2325201fddea90fefa40fe36c89749a1b913fd5cdac4433939f54f788294ac748f713e74f0d6760be1ce1463b0aadca8"}, {0x98, 0x112, 0xd0300000, "11d65ea1292f37c60b436e4715656d7b8ba9877be19dedaaac9f62b62af1003bd37dabbc0b1094aee007a6995256bda19d0df0b945b74b993bb3aea1aa0ce3457eea40e76ef2cc13480d9718ceec025634b08a266e47bd3045e01d443c6e2ccabce2dfcdd2426cadeb712789100edb0be3439c78931bbdbb97e3235359d6c2f36459ee461f18"}, {0x98, 0x114, 0x1, "c5977888f3aa01231ed28d519efaacc7eb9adfe6440c84714d218e690866816f39ad017bf1ba6f67b25c6a8d6ca335201b82bcde3183084e9be1b97c2f2dd0dc5d34570febe43304ffc4133d910a5da220cd561494bd1189fe0eb2f82878203af3a7ec802af05ecbf99e18bd818ac45f000288dcda2e590f8d715d88877c2e1829aa"}, {0x90, 0x111, 0x401, "216fd88d372b81e235173ba3a03a36bbc0c5e840eefac05fe72b4c20460fd886fcc8170678099bc7027465eb4d72b00f25d406972dcf11f58dc3e78ed7dd28374cc360d2534c280fe6f2cd5aba2b4d5bec6a201587c8af7455f58c13a193dfeb07bf201578c5ca646f77bf6be5a494d5132adc329bef489a63631239d6"}], 0x2d0}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x804000, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r2, 0xc0286687, &(0x7f0000000640)={0x2, 0x2, 0x14, &(0x7f0000000600)=""/20}) [ 266.009146][T23331] loop1: detected capacity change from 0 to 120065 [ 266.038399][T23331] loop1: p1 p3 [ 266.041981][T23331] loop1: p1 start 131072 is beyond EOD, truncated [ 266.048429][T23331] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:26 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x7f000001}}, 0x1c) 19:55:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x3f000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:26 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0xff8f000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 266.100827][T23376] SELinux: duplicate or incompatible mount options 19:55:26 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac14140a}}, 0x1c) 19:55:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x40000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 266.187475][T23376] SELinux: duplicate or incompatible mount options [ 266.205054][T23395] loop1: detected capacity change from 0 to 152833 19:55:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) close(r0) fcntl$addseals(r1, 0x409, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x110, r1, 0x2fd5f000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:26 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0xffffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 266.271146][T23395] loop1: p1[EZD] p3 [ 266.283404][T23395] loop1: p1 start 196608 is beyond EOD, truncated [ 266.289976][T23395] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:26 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a020400ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:26 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac14140b}}, 0x1c) 19:55:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x58000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:26 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:26 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x60000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 266.463004][T23444] SELinux: duplicate or incompatible mount options [ 266.477363][T23445] loop1: detected capacity change from 0 to 136449 19:55:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:26 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x2}, 0x1c) [ 266.562325][T23445] loop1: p1 p3 [ 266.566662][T23445] loop1: p1 start 262144 is beyond EOD, truncated [ 266.573147][T23445] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646566636f0700000000ed1329da5e0dbbf80000007374656d5f752f636f6e746578743f7379736124145f752c00253e6a68"]) 19:55:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x78000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:26 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:26 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a060400ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:26 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x3}, 0x1c) 19:55:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 266.708179][T23421] SELinux: duplicate or incompatible mount options 19:55:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:26 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x4}, 0x1c) [ 266.803783][T23486] loop1: detected capacity change from 0 to 103681 19:55:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x7ffff000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646566636f6e746578743d73797374656d5f752c636f6e746578743d73797361646d5f752c08cb271eb16a8da0a300000000eb53d36937987b359654eb596aed54853d48b489f307002eb39ee9dd5b0d6b0f9763f15f6559b39f4c5b9e98266b0d2f9c12347bb05fb7ee1f41ef2c2bc36baca38fef125e8976a8241eb230ceeb690229909fe475591f35a97b10818c328db606bee776776dd8276cb183132ad1db517bb3ac0c24a937b20751a50f"]) [ 266.855628][T23486] loop1: p1 p3 [ 266.859302][T23486] loop1: p1 start 262144 is beyond EOD, truncated [ 266.865735][T23486] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:26 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x5}, 0x1c) 19:55:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x80040200, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:26 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x10}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 266.914292][T23515] SELinux: duplicate or incompatible mount options [ 266.916117][T23486] loop1: detected capacity change from 0 to 103681 [ 266.948236][T23486] loop1: p1 p3 [ 266.952026][T23486] loop1: p1 start 262144 is beyond EOD, truncated 19:55:26 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x6}, 0x1c) 19:55:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000008, 0x30, r0, 0xa7581000) r1 = socket$inet6(0xa, 0x80000, 0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x800003, 0x2010, r1, 0x2000) r2 = socket$netlink(0x10, 0x3, 0xa) mmap(&(0x7f000030e000/0x2000)=nil, 0x2000, 0x1000000, 0x11, r2, 0x45602000) vmsplice(r0, &(0x7f00000014c0)=[{&(0x7f0000000080)="11e34d05e07baf3ea57125f2b6d24eee2b46943e1317d118b4847d3dc30bd2c818b09a6427c9e6d5362cd5a874e5477098d5d82683f107ad4e47fb49f5d85f6531fcfe1fc801258f1870bea7fa7bdc4a0c7c0b09bd", 0x55}, {&(0x7f0000000180)="5beef34958ce8b3bf838593c65237893c1c8f9c7e60f0c0baa2e7d7b3e3907b43038d77d06d025886dd7e4fd36265c175bd95edbe222764e1cc4f1d12f26e8b6096e9c5d70bf178808e7cd26f5ed5bab624a71da394b4bccd620d3fa8e1eed0fb7706d6a3b38bc33f34b785df5660af33a4b615cd1ff9eb9e64a0c799cfeb4", 0x7f}, {&(0x7f0000000100)="dbcb79c879cbf59e4c45d56546c0ae58cb52fccb2d148c1450556cf6b5fbea32a2afc6a4c65110165245b8ef86797a139470", 0x32}, {&(0x7f0000000200)="87753fe4c2d95ce142cfabb8378012f842724315eec982ed9beeccf79cd290e2ea6b177753996145d1da8bdea643715063535becbccd8d4dbcaed996abc9f01fb02496fbdc0a065ba7bbeb3fe3dc3771c896ab6101567781c667a3591a21d21d1dad", 0x62}, {&(0x7f0000000280)="b46749b6fe2a0e0f99b87348a027f2e3fda36117a57af43e5bf4e44e63cbe4a0f57589fce95054290e6aee20e63f505e45eaffbe0b10ca01383be6353973746dca7b747e4c4d9e454471e4c6026c75be54f90c4294f5b922f42f2ac23d9e6ea611934fe74f48b671f334f1fd1f3ffeab197e46608eb9400b688bfcf57c54563b65165573ec71c377f68bba3f73158bf87a8ba8e6cad59ba5d95644abc6", 0x9d}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="1bef130b73e652cd459963f731bc9c7a11ad7fe518ca3dd2a0c8d81e2851c8d2c70dc43f53578350bac4b6faf378f0f108f15ee539314d912bc39ca6f1fe61010b97c36ad0008dd7c2ca8c352b30e2ad0bbfac8c07f920b1325c5cfdff997e9035c64272cbe96c9e00a2ba3e3c651ff75c11a9e41aea484d776f3b4b0362d1a6d967d8b2d1920e7f4d6fb2764d7087ba732ce6df4ba6ab8b851e0f41d6c7a78f42f2f6dceb193273521631ac21f0c1db", 0xb0}, {&(0x7f0000001400)="7ebd3e0011700de80540df0b0a3f8bc376b296968a4da841520961050c9708e7cbfeaaaa5eb2c8d5ac239808bcaaae347f97fe14e3b350f8daaf415183a2ea8b56f7e14f86c71244927ac15ffa7500c4ed2de45c38d7391657fa423d7e21c34ffd8032d74e745927cfe96025cce0c7a1fe254c3a27d4024e157ea393a19d7c17ddb37a1cc4c500433a84b19d5d93ac62463e932c36", 0x95}], 0x8, 0x6) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) preadv(r3, &(0x7f0000002780)=[{&(0x7f0000001640)=""/40, 0x28}, {&(0x7f0000001680)=""/127, 0x7f}, {&(0x7f0000001700)=""/103, 0x67}, {&(0x7f0000001780)=""/4096, 0x1000}], 0x4, 0x7, 0xf4fa) sendmsg$AUDIT_USER_AVC(r3, &(0x7f0000001600)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000015c0)={&(0x7f0000001580)={0x2c, 0x453, 0x0, 0x70bd29, 0x25dfdbff, "1e32cec355b1cb8f6659818adac66f404ebe2ff02e1632d30bba", ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000001540)=ANY=[@ANYBLOB="6465896588e06d5f752c636f5a746563743d73797361646d5f752caf00"/40]) [ 266.958474][T23486] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:27 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a800400ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xa0050000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:27 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:27 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x7}, 0x1c) 19:55:27 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x41}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xc8050000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) r3 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r3, 0x409, 0x0) r4 = fcntl$dupfd(r0, 0x406, r1) r5 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r5, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r5, 0x409, 0x0) io_submit(0x0, 0x5, &(0x7f0000000500)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x100, 0xffffffffffffffff, &(0x7f0000000080)="071b5d326702fe565ec7ba562a3bce8974499115d377f96ce4b45f55a1f83aeba99a994fc934d17fb2a676591fe30bf04c679884e907b77b76f4720aa62b3b3a208c82b3850f3635474740cd8eb02eb7507080c2d5bdbb966c3dcb71f48818a55185316f8ed5325c27b69a63e54e1dc93ff96288dba4", 0x76, 0x1000, 0x0, 0x3, r0}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x81, r2, &(0x7f0000000180)="aaadd80dc9cb366599e4d6496d5ef73a35701e11e0377e69c89ec6e54b46b08c3f3955263f3cbb812c2d7ad0a83ccdc0ee59a715423ca846fe5a8379b596931be3f46e22c552cd06fb682f7bfdc59c5e14b548f6de8fe927281f8c1394fdd13fc4434d788e5e6e797fceab8fdfc63211a1f4a6d699d73be699e2463af173b30bb18c2ea6a0b9cf5d3f649d2c8925d0fdc89ad8958b98a5def8b3cc9786809385d8503c77c81d99d9b8797fb4460a8275fc5d121989d6fb1f38967ddf0c4b8c830235e505cf1f0a", 0xc7, 0x61d00384, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x40, r3, &(0x7f00000002c0)="85244f729355150b84d44685197696f395bf53a115e7ad0d08e0324b42e1a78c56b1a371ad96ba32960efb77829f294dd526f8a8da576c62dca6f4823fd7c02f0b7dbb13d42422425eb44060d1460b4df24cbc8209ae96e9db3ddc2c82f3f870b965f8a789a1db6594f602a748fd8bb3a4bf6f517d4438ded01d864b340c1691e4b526496c11c0acf5498612bda168186a782234a2d00a31b1d4aa3eb1f16357cb021411980dcc357fa5f4b17f255cc4e3812eee9b0d29a3294a8c61c2288bb9c47c2586dd96665b79c0cc3d18170fb98fd2c79a4e68f5873e8df89afad8c7252e4ec8c057627e75d35144f9", 0xec, 0x1, 0x0, 0x0, r0}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0x1, r0, &(0x7f0000000400), 0x0, 0x4, 0x0, 0x1, r4}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xa, 0x9, r5, &(0x7f0000000480)="20d1dd32860405589e2ad9467428a04cf90e4d6a2878bf", 0x17, 0x7, 0x0, 0x2, r0}]) [ 267.171651][T23563] loop1: detected capacity change from 0 to 161025 19:55:27 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x8}, 0x1c) 19:55:27 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000500ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 267.221616][T23563] loop1: p1 p3 [ 267.225267][T23563] loop1: p1 start 262144 is beyond EOD, truncated [ 267.231711][T23563] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:27 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x60}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 267.284504][T23585] SELinux: duplicate or incompatible mount options 19:55:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xe0ffffff, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:27 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xf}, 0x1c) [ 267.354965][T23597] loop1: detected capacity change from 0 to 152833 [ 267.366423][T23585] SELinux: duplicate or incompatible mount options 19:55:27 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x10}, 0x1c) 19:55:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x12700, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x700, 0x5, 0x25dfdbfb, {{}, {@void, @void}}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004004}, 0x4015) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:27 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x1100}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xe8030000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 267.444587][T23597] loop1: p1[EZD] p3 [ 267.452830][T23597] loop1: p1 start 327680 is beyond EOD, truncated [ 267.459396][T23597] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:27 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a310500ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 267.500632][T23621] SELinux: duplicate or incompatible mount options 19:55:27 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x11}, 0x1c) 19:55:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 267.551139][T23639] loop1: detected capacity change from 0 to 264192 19:55:27 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000180)={{0xcc, 0x3, 0xfe, 0x140, 0x19d, 0x2a0d, 0x306, 0x10001}, "e6761bfcc6e77b1f410ebe2b0807dce80184b56e9a345766cfe0e0d7b356a995d36b1245fb28c8eb387251b7e5cf9c2448a19ed852d8eaba3776014662c2aa56ab4b40ab36971eb8cdcdbf8535f03f9ec5ca85d077d9afbb5fd7f5bd0b728f9ecc807d95467a6538a413bb4abe4cd5ec2b84371044db1baab5e4a42e34d64a3689a4232da6dd2eec2d579c3ed237a156a002936e0293d32386e491297df94fcad99d8e46a4cc6bca1148dd113f80a32a0aa24b857cdb35eb537505a5cacb687d7cf9a7b21120fc", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x7e7) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) fallocate(0xffffffffffffffff, 0x1, 0xd7, 0x8) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r1, 0x409, 0x0) close(r1) 19:55:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xeffdffff, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:27 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x1f00}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 267.601795][T23639] loop1: p1 p3 [ 267.605527][T23639] loop1: p1 start 327680 is beyond EOD, truncated [ 267.611990][T23639] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:27 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x28}, 0x1c) 19:55:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xf4010000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 267.642606][T23653] SELinux: duplicate or incompatible mount options [ 267.674302][T23639] loop1: detected capacity change from 0 to 264192 19:55:27 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x30}, 0x1c) 19:55:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:27 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x4000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 267.720391][T23639] loop1: p1 p3 [ 267.724308][T23639] loop1: p1 start 327680 is beyond EOD, truncated [ 267.730860][T23639] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 267.735862][T23677] SELinux: duplicate or incompatible mount options 19:55:27 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000600ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:27 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x58}, 0x1c) 19:55:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xf5ffffff, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 267.788380][ T1033] loop1: p1 p3 [ 267.792205][ T1033] loop1: p1 start 327680 is beyond EOD, truncated [ 267.798672][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:27 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x4100}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:27 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x60}, 0x1c) 19:55:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfc000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:27 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x6000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:27 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x78}, 0x1c) 19:55:27 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_DEV(r1, 0x0, 0x80) sendmsg$NL802154_CMD_SET_PAN_ID(r1, &(0x7f0000001400)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000013c0)={&(0x7f0000001340)={0x2c, r2, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x4008014) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x94, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_ENABLED={0x5}, @NL802154_ATTR_SEC_OUT_KEY_ID={0x68, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x48, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xfffe}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x3ff}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_ENABLED={0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x20048440}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000080)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000539000/0x4000)=nil) 19:55:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 267.968620][T23717] loop1: detected capacity change from 0 to 152833 [ 268.031124][T23717] loop1: p1[EZD] p3 [ 268.040127][T23717] loop1: p1 start 393216 is beyond EOD, truncated [ 268.046668][T23717] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 268.048082][T23737] SELinux: duplicate or incompatible mount options [ 268.110741][T23737] SELinux: duplicate or incompatible mount options [ 268.148471][T23717] loop1: detected capacity change from 0 to 152833 19:55:28 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a040600ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:28 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfe800000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:28 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xfc}, 0x1c) 19:55:28 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x8fff}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x1ff) 19:55:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 268.189242][T23717] loop1: p1[EZD] p3 [ 268.201036][T23717] loop1: p1 start 393216 is beyond EOD, truncated [ 268.207471][T23717] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:28 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x103}, 0x1c) [ 268.262607][T23767] SELinux: duplicate or incompatible mount options [ 268.283874][T23767] SELinux: duplicate or incompatible mount options [ 268.292270][T22959] print_req_error: 12 callbacks suppressed [ 268.292283][T22959] blk_update_request: I/O error, dev loop1, sector 152673 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 268.292408][ T1794] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 268.308007][ T702] blk_update_request: I/O error, dev loop1, sector 152673 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 268.328177][ T702] buffer_io_error: 8 callbacks suppressed [ 268.328249][ T702] Buffer I/O error on dev loop1p3, logical block 19056, async page read 19:55:28 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0xff8f}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/86, 0x56}], 0x1, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='aefcontext=system_u,adm_u,\x00'/38]) 19:55:28 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfe80ffff, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 268.356325][T22959] blk_update_request: I/O error, dev loop1, sector 152673 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 268.375608][ T702] blk_update_request: I/O error, dev loop1, sector 152673 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 268.386962][ T702] Buffer I/O error on dev loop1p3, logical block 19056, async page read 19:55:28 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x1f4}, 0x1c) [ 268.428000][T23784] loop1: detected capacity change from 0 to 120065 [ 268.509661][T23784] loop1: p1 p3 [ 268.513247][T23784] loop1: p1 start 393216 is beyond EOD, truncated [ 268.519760][T23784] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 268.587823][T23784] loop1: detected capacity change from 0 to 120065 19:55:28 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000700ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:28 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfec0ffff, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:28 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x17000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:28 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x220}, 0x1c) 19:55:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:28 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, 0x0, 0x20040010) sendmsg$NL80211_CMD_SET_PMK(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x900}, 0xc, &(0x7f00000002c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010037d0b42d3b0200002aabde1f68c3098d08000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000370000001400020110c12fe359c901ec47384564eca4d73d"], 0x3c}}, 0x20000004) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e22, 0x8b, @empty, 0xae8}, 0x1c) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080024bd7000fddbdf252100000008000300", @ANYRES32=r2, @ANYBLOB="080077d7fbfff1ff"], 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0xc4) sendmsg$NL80211_CMD_SET_KEY(r1, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000780)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="9106abb7d37932411e2c71fae7c310b389a7ff74e98674fbe3933dbe9d8c7e5201bf28c1627047ba5373eca8d452a9b071edc8cac398620c00c0681c5eb000a4b01a509972462c23ac61183f3bedb9374fe2ead320fa03adeb7517ae7a8e8107b88001df6f8c19008d375dca9159332d1868bcaf00"/137, @ANYRES32=r2, @ANYBLOB="9613000a00243c062bd5b4aabcf6198b9f6e66090020005080050009000100000005000000000000000a000400a7c5d43f7aa100070000bc0000000000173bb549fc7c000000000000b35e01b23950179ff2473953f65bbab64b8eff35a06f85482734c3d48974bf29b1005a77f898189b2a3897b6a2f7376cb4dc347c766851b9c029e880b219582ad1ff01190a052063b2cb7178694c106ef98280903a3ad475153452e544aa44d6dbde4732bd12ebff44870e792346486ec20f20f3fa1bb76c7f4fed6881382cf499cddb8e086293f26977d1e11e68c22162241b1fee31f85d25d4310802dcc97aa9f443c914"], 0x70}, 0x1, 0x0, 0x0, 0x4004005}, 0x4000030) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400ea00", @ANYRES16=0x0, @ANYBLOB="04d1b7745a3523f7a11c002700000000ff02b7", @ANYRES32=r2, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x14) sendmsg$NL80211_CMD_AUTHENTICATE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10250500f784080003010000000000000000", @ANYRES32=r2, @ANYBLOB="090007000495b225ef000000"], 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x20004010) sendmsg$NL80211_CMD_SET_MAC_ACL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4004600}, 0xc, &(0x7f0000000080)={&(0x7f00000005c0)={0x1ac, r0, 0x200, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x7f, 0x62}}}}, [@NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x70, 0xa6, 0x0, 0x1, [{0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}]}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x40, 0xa6, 0x0, 0x1, [{0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}]}, @NL80211_ATTR_MAC_ADDRS={0x1c, 0xa6, 0x0, 0x1, [{0xa}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x4c, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_MAC_ADDRS={0x4c, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x20000010}, 0x2400c010) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0x9}, @NL80211_ATTR_P2P_CTWINDOW={0x5}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x93}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0xfc}, @NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0x1}, @NL80211_ATTR_AP_ISOLATE={0x5}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0xfa}, @NL80211_ATTR_AP_ISOLATE={0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x90}, 0x4000) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000100), &(0x7f0000000180)={0x0, 0xfb, 0xb0, 0x5, 0x1, "29343ed8a44afc29a9849516f784b189", "811e82c3b242091edcde4339298fc6ba227748d9adb52df09034ab15daf8e3bde5bcaa7ffa7e0abcafdf57bdf82dd57021fb053a6b66056ea10801f8f81497db15ab481baf1276e7c007f2d7324c8f67adbe9e6b401531ae682f01b4d28177452a25b8675698966fd5be21f5b2c6fd568e7f7c53046898adf67b48a0c389535bbc19a0f6d0b9a8e85fbf934a1a3c2bb27ae7e64e79c8b4b8ba5f62"}, 0xb0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 268.630426][T23784] loop1: p1 p3 [ 268.634608][T23784] loop1: p1 start 393216 is beyond EOD, truncated [ 268.641053][T23784] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:28 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x300}, 0x1c) 19:55:28 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x20010}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 268.706979][T23829] SELinux: duplicate or incompatible mount options [ 268.745397][T23834] loop1: detected capacity change from 0 to 152833 19:55:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:28 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfeffffff, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:28 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x301}, 0x1c) [ 268.828015][T23855] SELinux: duplicate or incompatible mount options [ 268.834474][T23834] loop1: p1[EZD] p3 [ 268.840505][T23834] loop1: p1 start 458752 is beyond EOD, truncated [ 268.844002][T23859] SELinux: duplicate or incompatible mount options [ 268.846956][T23834] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:28 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x20200}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:28 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000a00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:28 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xff000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:28 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x101440, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0xffff, 0x0, 0x0, 0x1, 0x1, "9ed3689494686bb741750a869a98b33ad7add9", 0x4, 0x20}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:55:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:28 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x3e8}, 0x1c) 19:55:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xffff0000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 268.999005][T23875] loop1: detected capacity change from 0 to 152833 [ 268.999101][T23877] SELinux: duplicate or incompatible mount options 19:55:29 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x80000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x3f) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x835fc, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 269.068638][T23875] loop1: p1[EZD] p3 [ 269.072890][T23875] loop1: p1 start 655360 is beyond EOD, truncated [ 269.079454][T23875] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:29 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x500}, 0x1c) 19:55:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xffff80fe, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:29 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000b00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:29 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x100000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 269.160734][T23906] EXT4-fs warning (device sda1): ext4_group_extend:1793: can't shrink FS - resize aborted [ 269.183324][T23906] SELinux: duplicate or incompatible mount options 19:55:29 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x5a0}, 0x1c) 19:55:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) open_by_handle_at(r0, &(0x7f0000000080)=@FILEID_BTRFS_WITH_PARENT_ROOT={0x28, 0x4e, {0xffff, 0x37b8, 0x3, 0x6, 0x401}}, 0xa00) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 269.234391][T23906] EXT4-fs warning (device sda1): ext4_group_extend:1793: can't shrink FS - resize aborted [ 269.262157][T23922] SELinux: duplicate or incompatible mount options [ 269.275513][T23921] loop1: detected capacity change from 0 to 152833 19:55:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xffffc0fe, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:29 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x101000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:29 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x5c8}, 0x1c) [ 269.346786][T23937] SELinux: duplicate or incompatible mount options [ 269.365449][T23921] loop1: p1[EZD] p3 [ 269.374573][T23944] SELinux: duplicate or incompatible mount options [ 269.386787][T23921] loop1: p1 start 720896 is beyond EOD, truncated 19:55:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x70042, 0xcf) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 269.393290][T23921] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:29 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x600}, 0x1c) 19:55:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfffffdef, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 269.489309][T23961] SELinux: duplicate or incompatible mount options 19:55:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:29 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x17f000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:29 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a001800ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:29 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x700}, 0x1c) 19:55:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='defcontext=system_u(context=sysadm_u,\x00']) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r1, 0x409, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}, {&(0x7f00000000c0)=""/98, 0x62}], 0x2, 0x3, 0x7) 19:55:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xffffff7f, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xffffffe0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:29 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x810}, 0x1c) 19:55:29 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x209b1e}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 269.648027][T23984] loop1: detected capacity change from 0 to 152833 [ 269.702137][T23984] loop1: p1[EZD] p3 [ 269.706151][T23984] loop1: p1 start 1572864 is beyond EOD, truncated [ 269.712718][T23984] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:29 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'syz', 0x2}, 0xfffffffffffffffa) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r0, 0x409, 0x0) lseek(r1, 0x5, 0x4) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) sendfile(r2, r1, &(0x7f0000000100)=0x5, 0xffffffffffff7fff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646e66636fee746d805c15dc0994705e9b6578743d7379fcd02c636d6e7401000000000000"]) 19:55:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfffffff5, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:29 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xf00}, 0x1c) 19:55:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:29 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x400000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:29 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a001c00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfffffffe, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:29 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x1008}, 0x1c) 19:55:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='defcontext=systei_u,context=sysadm_u,\x00']) r2 = accept$unix(r0, &(0x7f0000000080), &(0x7f0000000100)=0x6e) close(r1) dup2(r1, r2) 19:55:30 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x1100}, 0x1c) [ 270.067700][T24038] loop1: detected capacity change from 0 to 152833 [ 270.077403][T24041] SELinux: duplicate or incompatible mount options 19:55:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x10000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:30 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x600000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 270.128592][T24038] loop1: p1[EZD] p3 [ 270.132699][T24038] loop1: p1 start 1835008 is beyond EOD, truncated [ 270.139246][T24038] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 270.153844][T24041] SELinux: duplicate or incompatible mount options 19:55:30 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x2002}, 0x1c) 19:55:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000180)={{0x0, 0x8, 0x5a2f, 0x6, 0x8, 0x2, 0xc3, 0x9, 0x5, 0x0, 0x2, 0x40, 0x200, 0x3, 0x7f8000}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:30 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a002000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 270.313431][T24076] SELinux: duplicate or incompatible mount options [ 270.324477][T24081] SELinux: duplicate or incompatible mount options 19:55:30 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x2800}, 0x1c) 19:55:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x7ffffffff000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:30 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x700100}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:30 executing program 0: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000080)={0x2, 0x949, 0xdda, 0x7ff, 0x5, "e4cfd21da119ed212466a0b7fe45abf9813b82", 0x400, 0x7}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 270.356317][T24082] loop1: detected capacity change from 0 to 152833 [ 270.420843][T24082] loop1: p1[EZD] p3 [ 270.424882][T24082] loop1: p1 start 2097152 is beyond EOD, truncated [ 270.431418][T24082] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 270.450781][T24095] SELinux: duplicate or incompatible mount options 19:55:30 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x3000}, 0x1c) 19:55:30 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a002600ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xffff00000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:30 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0xf01700}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 270.496161][T24105] SELinux: duplicate or incompatible mount options 19:55:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) shutdown(r3, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @broadcast}, 0x2, 0x2, 0x3, 0x1}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000180)="0369bf5360489c59326bc01f8af6e08ed1583a074788428a9ad647c09ac162c51418802de3014130d065b88fd1b010ca7f1202a648acd6a4dec646fe481b07837a035819e6428c8cd77ee008301b05eac360928f2484306efeead586210f6932ddc3d30c9e0431da937a722d2dd1c27df321", 0x72}, {&(0x7f0000000100)="46ac0b47e9afd8e1dde4b52d4c54629620cf85c661867bdf6f9ed373a47424cdf45c9d26f858baf3706d65753dacb9a15a8dfa93267b3334f3ffb5", 0x3b}, {&(0x7f0000000200)="1cf3a15174552662b17077d56da62872739cdb942be7ed098adfb631e2353a0bccc0ec6e3d2247610b4c41eb81015d6bbb9528dd73356fa86aee394a4d3b4b7bfe7bd200509b0c300b115eb529f3f784dc158555fab72b6c5e7a763c937b819665", 0x61}, {&(0x7f0000000280)="0baa8c1de40a97937fa9be074bd77a01c51e6456734cd62b8ff2d53dd747cf6d0a5f8d3633f9c63e91f303e69c236f", 0x2f}, {&(0x7f00000002c0)="5310d2feebba8020fccc82d0489b951bb906d152c5c8a8007e785bbcccd90e632517777eee440d6f0dec6559d2bcc7d1817fd33180b58076a7ad213e46ba51f5e68fcbbb637bdf629cb80f80689657a45d8e6219c99dd5f57279ae299f438cf3d6e3bbc29f6128eaf7fff33b766a01f91ed053e5c11cc7ad3a214839635c5e73ffd0b2cdcdd19d1ee145fe50431e4bf22b4c3a0d779d0f01d732d6c67ed403bc1a79756be640810c901ccf99b878d1fe0b6b1583a4d5f70ad36d113dd75cda7a2aaf1cc5838018c7", 0xc8}, {&(0x7f00000003c0)="4649991e99a6e2b47136c4f4290775ec92dab7e40bec71e61e5389c3efe715feff44830ad685ed07c3b725c8e540784b84c4e7bf268a852a5c3b3dd800c258714127425a74e546d032755ebeeadf502dcb6da2cd00dcd891c832", 0x5a}, {&(0x7f0000000440)}], 0x7, &(0x7f0000000500)=[{0xf8, 0x115, 0x1, "b45826f03acf679a028d2c89105084424a3493794ef6cd15eb99173ce5d8e6c3e6f5e3bab59e510cf46dd68566be7d1eb3613688029d33590d4176c85d05ca2bd13eecbd039df76d51fe7b6b4cfe24a73f0fe8491d5d8ee66ea34722d8b28fb183fee97344dc1f20c9e4ad78a62ca9ac4a10b376fbffcb231cfafc14d56ce5d94bb6bfb849be2927b30cf87a3fa009835997436bf060b38e4bb100dddc1f949bf0264039ca8c35db75810ba231c26aa318f92e35d435d90017d92b6cf7bd2809d48b215aa3ab26ddb7b8797fefdb400e056014613ef31e851583cc569697881264"}, {0x58, 0x6, 0x5de1, "6f08d93f8044cbc1fa784c5a1ec0e3285bb1fd5908865e3ae5c474d73c1e33886570a62e64c7819fd5a4621a62bd0a16c2d33e387915726598e6b3ec280fe4c4a14307f2b03d86"}, {0x58, 0x10e, 0x1, "c7b3e0aee3be690c6871678e40dcf30f39414cd8235c70b434227ffb3f7d7eda28b6b7966a5ca44937648ad7ee94150a91e59ba282c444b6786e423bdbbff547813f832c2524"}], 0x1a8}, 0x4000004) mmap(&(0x7f0000601000/0x4000)=nil, 0x4000, 0x1800006, 0x12, r0, 0x16850000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:30 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x3f00}, 0x1c) 19:55:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x4000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 270.595421][T24121] loop1: detected capacity change from 0 to 152833 19:55:30 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x1000000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 270.642621][T24130] SELinux: duplicate or incompatible mount options [ 270.668030][T24138] SELinux: duplicate or incompatible mount options [ 270.683295][T24121] loop1: p1[EZD] p3 19:55:30 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x4000}, 0x1c) 19:55:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x0) 19:55:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x835ff, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646566636f6e746578ff3d73797374656d5f752c636f6e746578743d73797361646d61752c00"]) [ 270.692969][T24121] loop1: p1 start 2490368 is beyond EOD, truncated [ 270.699537][T24121] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x10000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:30 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a053100ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x40030000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:30 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x5800}, 0x1c) 19:55:30 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x10000200}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000140)={0x4, 0x8, '\x00', 0x0, &(0x7f0000000100)=[0x0]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646566636f6e74657874532767ac58dc3f3908b219d03d73797374656d5f75a541dfbf04af5eff3d73797361646d5f752c00e263a3698ae01b3e293c649eaeb6c47b735c1a092b2b88bfdfe5b791b4baa06994b6f70b00"/102]) 19:55:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xf0ff7f00000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:30 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x6000}, 0x1c) [ 270.861198][T24171] loop1: detected capacity change from 0 to 111873 19:55:30 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x20200, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1800003, 0x12, r1, 0x1000) preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000140)=""/193, 0xc1}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000280)=""/225, 0xe1}, {&(0x7f0000000380)=""/31, 0x1f}, {&(0x7f00000003c0)=""/100, 0x64}, {&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/59, 0x3b}, {&(0x7f0000000500)=""/212, 0xd4}], 0x8, 0xd9f, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000100)={0x7, 0x6d, 0x2}, 0x7) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7365636c6162656c2c736d61636b6673756f677443dd08f389baa3edff6e1f"]) 19:55:30 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x11000000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 270.947979][T24171] loop1: p1 p3 [ 270.951858][T24171] loop1: p1 start 3211264 is beyond EOD, truncated [ 270.958453][T24171] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x0) 19:55:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xf0ffffff7f0000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:31 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x7800}, 0x1c) 19:55:31 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a003f00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:31 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x1e9b2000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:31 executing program 0: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) openat(r0, &(0x7f0000000240)='./file0\x00', 0x20e080, 0x98) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_setup(0x2248, &(0x7f0000000080)={0x0, 0x4ee2, 0x4, 0x2, 0x3dc, 0x0, r2}, &(0x7f000030a000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000180)=0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000008, 0x11, r2, 0x61a42000) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r7, 0x0, 0x0}, 0x0) r8 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x8, 0x20010, r2, 0x10000000) r9 = syz_io_uring_setup(0x220c, &(0x7f00000001c0), &(0x7f0000ff9000/0x6000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r9, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r9, 0xa, 0x0, r10) syz_io_uring_submit(0x0, r8, &(0x7f0000001c80)=@IORING_OP_SENDMSG={0x9, 0x1, 0x0, r2, 0x0, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001800)="42f550c0403cf48b8f36334d3ca52ffc5c8f7fefa9a6566d77520e47758ccb1e267e254132b10a75eec1b37c6b5829b4202051f9b01d764c4afc3162bad91308d0117c97b42d01894fdbe11044dddfabcfccc42377a5605578f0c925e6112775c69df50c348a0b1a318f143d5605a8b7986a925ec88f48f37fb4b9a1f812c523411e0a39ed7ae106338323", 0x8b}, {&(0x7f00000018c0)="da43feb91377c290a527dc5a96455ff94804f18a93689fad82b4aed85f96d5bf8c808b317d02396fee8142e37b0e4c1cbea02a0132dac0c8a1fcbc03fa367ab2b0037f14daac961956acd85e01ba4f1ab15ff27b0a25eceb52fdf52318ea7201140e4c948398fb6a7bb3e039143981a61e1e97783a2015b9e2a6788fbce9f8c6b0552177e184e1cd26b11ca9f3b1ea62fa789fcbc709db4134ae3495835863", 0x9f}, {&(0x7f0000001980)="f48631a5bcd58a42bc67430842422341acf5ba44e85838ad0d299e77a15a687dc0d38d67995de61ba54eeaa147003d93490c05ea032f99c8f31c0f3b9be5cdf7d731b5578f81e672f6a2026751795f", 0x4f}, {&(0x7f0000001a00)="1b48abcf3660217942e4bb638b957bb0808a27f725a2215b1b850aad387a0400636eaa69461db9886d25bd99a1a735b389b30ff4808a0f759b2e3f7b920d3de63d1264a1f090b9a1ddcf2cdcd10675d957d9d51c0d8f6652940e6a76a8bf381838a83dbcdc40ac621c0191c9014f17bde1567e76385d716c6987e3cce4f5954187b5ecee68e5dc26c304ff", 0x8b}], 0x4, &(0x7f0000001b00)=[{0xa0, 0x5, 0x8, "6d05c60b77e05759548394056c427112392b5aeba70f498719a125a68ba735ab3297ae9478634c59733e7182ebbcc799521159f07ae6ab721193cda48ee97652d89c274777fc9923c9fbaf915a9d101a026384c76703f376fc73e80899f6d533aa1f6ebf7a2e80934b84cc66211c805c53dcfdbece6b5ca6f74834b82880747d036c6062ea580847c824db140bbebf"}, {0x78, 0x0, 0x0, "442abfbe3d1a0eb11a24b2f133e8332a78cf4505a1ac946f447343d5e2f200122580124554b72341138acaffad44b9a6794b90fa38e3e4b99b43a77cfbdacdf2d9ab268104002ae735d1023f46704d70271244c025db6faac958341021bd4895bdd62165bcc7d1"}], 0x118}, 0x0, 0x44, 0x1, {0x0, r10}}, 0x3) shutdown(r7, 0x0) sendmsg$inet(r7, &(0x7f0000001740)={&(0x7f0000000280)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000001680)=[{&(0x7f00000002c0)="513ffec8151326a18cbff77b744f3acbad65033fc65712af32ca558ee005850fc8040850a910ff651c90061ca71dbe20b0c34bf419be282290500dfb2ef0eb88e3a16a3f53ae0492af07e9876f0289d1bc8a3f2dd7c5d3ca818fc1d923341f30187a82d6352405bc23ae8ff5b1092f1c89613c0e1b6e", 0x76}, {&(0x7f0000000340)="6b71fdce4245cd2fc928cf19ba2e47dc630026a7f5a1df6fde03db8404068535e0ea06727f00e48c57090b10f4b07630b258879e765e4082bf9ea072ddb8bb3bee43dcc92fa2e4904c95f77b0c124a1e08f6c849e844dbb3bf568ddfa492062de11aa71d15c6c541afb4b4ceff85c202f19d192718136a70f7b0eb70f988da463096c7a94b602e5a5244649a8446aacbc0205597e4a9bb01fa77b77df9b6abfd064ba867a01b618990c3beb56754ea", 0xaf}, {&(0x7f0000000400)="233831b2d2a79e1ad1a91dc3bf7515b6f5249e0b507661e6ec203068dc2030bb701cdd16b2d0f83ae9341085ef2936d344e8fe99953ed8d8b78937e1cb163d568eca03210fed20c0d6afcf89d4dba70a2611843dba08a7ed2d3f6a6a35c2caa7b5ce6d406603bd48e4254f8892319e955e5617787c5639f47f2829a9ad9ac0fcac909d38f6702aaffb4b810d2ad7adef0750b03cad825a869758078d0f1b9fca10275d95ac2aac4a063a36ce7114225ad747800fefb15a9371e54f3e3817b248602d58f9a8e271305bf66c2194c72dbc1a3e8a3c63cea18d0a0c0095809f394210a5592bbce64eacdc51fc68c0f2", 0xee}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="9c3b97f37b807b77e42c00624ca4cc", 0xf}, {&(0x7f0000001540)="864d2369f34757d2741e2970341d566cf4e6b4e5dc2982cb8a994b74e07579e40f8dabc4513a93e9764f2259cb03a4a41400d1a4110b377c9534ec33218de9bc9019bc7e9c265448a36f3789ec978d57c61e30491cd8c284d660b27f7aa3d83847798255c5d7cb17f7d49af3eea71a36c0dfa2453f9f8e6ab7027beb02a8b8191cff0fc036bc5fb39e3c3926e0b7f3679ea41f7275febbcf626b1761824c5c", 0x9f}, {&(0x7f0000001600)="735214235acb41f2b0b64c07a7172efa8e2a196a79cf576f617fed09aac01a289761924299a0c002a95a33a7b67892ab138e7839a85e31c2ff1fa655d2085bc6c3cea9a6d380bd5b0b94616880a1385ff9541e8fb448d4ae56a7fa5b45ee6a95911433fcf50f349823cd9126c2e9008abe", 0x71}], 0x7, &(0x7f0000001700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @dev={0xac, 0x14, 0x14, 0x1a}}}}], 0x20}, 0x20000000) r11 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646566636f6e746578743d73797374656d5f752c636f6e74657874590f049368b5ea47d7be53"]) linkat(r1, &(0x7f0000001780)='./file0\x00', r11, &(0x7f00000017c0)='./file0\x00', 0x0) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_NOP={0x0, 0x3}, 0x2) 19:55:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x100000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:31 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x80fe}, 0x1c) [ 271.123853][T24221] loop1: detected capacity change from 0 to 152833 19:55:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000f, 0x20010, r0, 0x63190000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r1, 0x409, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/key-users\x00', 0x0, 0x0) vmsplice(r2, &(0x7f0000000340)=[{&(0x7f0000000100)="bf0aba983ff99130944abde19907d0f025fcf42c26419ce754b30f", 0x1b}, {&(0x7f0000000180)}, {&(0x7f00000001c0)="84bda93bf510fb903dfdf90d50a95cefe2615396b121f0ca07287ac12257b99fbb819bf3a6cb1f8e318ca7ca2b9110b54d17bb7035d2c95deccbec5fc85603ec", 0x40}, {&(0x7f0000000200)="7e7a93900f41a677407628f1e8beab896245a59fd5e0d82b06b09326e7d7e0541a0735690fd32cfff7c199642534a362c112f3cee3ab224ad96090d1e187b8323389b029ca4aa0d41dfcad05bde2b836b0f86aaab0c8f15c11073eb73f1b7fc8a6547a87daa482cf282f1fb40e8b1b5955f66cb1c69104f71fcf40d573a568f4698b4e14d262116f090ceea31210b3e24a0ba17b22", 0x95}, {&(0x7f00000002c0)="8ab6fca7c953f34da2f4d63e10e46dec76b15e55a186a40753d57e1f811dec7e2bd17727dd3093f2a6b12db17b0276fb48e25e2bfe48cce95bd44625a9dca42dd71493a16409ef56f46a3ba7921223f975362687525aab62ce8774692d67a1344476a17e7c0d8e8b0ca265a0d6972498", 0x70}], 0x5, 0x5) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000080)=0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:31 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x1f000000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x103000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 271.181645][T24221] loop1: p1[EZD] p3 [ 271.185651][T24221] loop1: p1 start 4128768 is beyond EOD, truncated [ 271.192217][T24221] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:31 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a004000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 271.346092][T24263] loop1: detected capacity change from 0 to 152833 [ 271.383562][T24268] SELinux: duplicate or incompatible mount options [ 271.390401][T24263] loop1: p1[EZD] p3 19:55:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x0) 19:55:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x200000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:31 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xa005}, 0x1c) 19:55:31 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x41000000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 271.394412][T24263] loop1: p1 start 4194304 is beyond EOD, truncated [ 271.400960][T24263] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:31 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a048000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x300000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:31 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xc805}, 0x1c) 19:55:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00005a0000/0x1000)=nil, 0x1000, 0x1800003, 0x12, r0, 0x72595000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$setlease(r0, 0x400, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:31 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0xf5ffffff}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 271.533218][T24280] loop1: detected capacity change from 0 to 120065 19:55:31 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0afdef00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 271.608071][T24280] loop1: p1 p3 [ 271.611898][T24280] loop1: p1 start 8388608 is beyond EOD, truncated [ 271.618611][T24280] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:31 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xe803}, 0x1c) 19:55:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x400000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:31 executing program 2: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a003f00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:31 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xf401}, 0x1c) 19:55:31 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0xff8f0000}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 271.659135][T24307] SELinux: duplicate or incompatible mount options [ 271.682825][T24314] SELinux: duplicate or incompatible mount options 19:55:31 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xfc00}, 0x1c) [ 271.733556][T24321] loop1: detected capacity change from 0 to 193793 19:55:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x500000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 271.777947][T24321] loop1: p1 p3 [ 271.783086][T24321] loop1: p1 start 15663104 is beyond EOD, truncated [ 271.789742][T24321] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646566636f6e745c797374656d5f752c636f6e74657874bd73797361646d5f752c007f191e0f63103108003d4604f6cd535937712dbceab6b917a1ae371948b21f4fff99a1b68b98d2e241ccab7b354db055424765e9ab38a30895d8e18d638ece936ddf0aea339e6c583108bc0bc1f880f9fa1528004f611f567d8e70cc8e373d39f7ec"]) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = io_uring_setup(0x2ec7, &(0x7f0000000280)={0x0, 0x437e, 0x0, 0x3, 0x40, 0x0, r2}) syz_io_uring_setup(0x5e7d, &(0x7f0000000300)={0x0, 0xb29f, 0x8, 0x1, 0x100, 0x0, r3}, &(0x7f00003ec000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000040)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r5, &(0x7f00000058c0)={&(0x7f0000000440), 0xc, &(0x7f0000005880)={&(0x7f0000000a80)={0x1478, 0x0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_EEE_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_EEE_MODES_OURS={0x13d8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x77, 0x5, "243326576e5a977341a8d915548da6d156d6a7ff2600f1abd26e39574dc7fed283677829c67d973c21eac975cb314370fdb86fdcf96e0d46dcf75c0c29fb09267ae63495e372bfee060b22dd6a2a8646f096720efbd60d1483d2c4b8e6b1d87711d332c530bcd5eb3b47c622113ea35dff335e"}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_BITS={0x5c, 0x3, 0x0, 0x1, [{0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_NAME={0x1d, 0x2, '+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'sit0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'SMC_PNETID\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7d, 0x5, "8310602d7a6a9f1cdeffc8e32981893189b5995ab4e4a07e5e203758798721f5bf43ac74832d4c9f8baec799250456ff8ccac5e350a9f4f19a49f11cae9af449ab427454a8254bc1386bf05637b0ee982190d11ff1e64f02675b6df77cc9af3797ed8f0a450acb90d9b8897a7927f8b93b8b311c3469df2642"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1ff}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_VALUE={0x101, 0x4, "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"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'sit0\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffd}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff8}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'SMC_PNETID\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'SMC_PNETID\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'cpuacct.stat\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x1d, 0x2, '+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[+\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x1478}, 0x1, 0x0, 0x0, 0x10}, 0x40) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'syztnl0\x00', r6, 0x29, 0x3, 0x4, 0x4, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x1, 0x20, 0x9, 0x3f}}) r7 = openat$cgroup_ro(r0, &(0x7f0000000740)='cpuacct.stat\x00', 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000400), r7) fcntl$addseals(r1, 0x409, 0x0) splice(0xffffffffffffffff, &(0x7f0000000140)=0x7ff9, r1, &(0x7f0000000180)=0x9, 0xffffffffffffff4a, 0x1) 19:55:31 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0aeffd00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x600000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:31 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0xfffffff5}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 271.881772][T24341] loop2: detected capacity change from 0 to 152833 [ 271.913309][T24356] loop1: detected capacity change from 0 to 264192 19:55:31 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xfe80}, 0x1c) 19:55:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x700000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 271.945193][T24359] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 271.954985][T24341] loop2: p1[EZD] p3 [ 271.965797][T24341] loop2: p1 start 4128768 is beyond EOD, truncated [ 271.972385][T24341] loop2: p3 size 1912633224 extends beyond EOD, truncated 19:55:31 executing program 2: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:32 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 272.004059][T24356] loop1: p1 p3 [ 272.008117][T24356] loop1: p1 start 16580608 is beyond EOD, truncated [ 272.014720][T24356] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xff00}, 0x1c) 19:55:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x800000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:32 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0afffe00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 272.073809][T24359] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 272.104036][T24386] loop2: detected capacity change from 0 to 264192 19:55:32 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x80) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x20480}, 0x1c) 19:55:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xf00000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 272.167853][T24386] loop2: p1 p3 [ 272.171630][T24386] loop2: p1 size 11290111 extends beyond EOD, truncated [ 272.203184][T24386] loop2: p3 size 1912633224 extends beyond EOD, truncated 19:55:32 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x34000}, 0x1c) [ 272.227754][T24418] loop1: detected capacity change from 0 to 177409 [ 272.243924][T24420] SELinux: duplicate or incompatible mount options 19:55:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x1000000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:32 executing program 2: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 272.271915][T24418] loop1: p1 p3 [ 272.279234][T24418] loop1: p1 start 16646144 is beyond EOD, truncated [ 272.285928][T24418] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xfffffff9, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x100000, &(0x7f00000000c0)={[{@noauto_da_alloc}], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x1008000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x40000}, 0x1c) 19:55:32 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x11, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 272.372135][T24418] loop1: detected capacity change from 0 to 177409 [ 272.397193][T24453] loop2: detected capacity change from 0 to 264192 [ 272.408130][T24418] loop1: p1 p3 [ 272.411976][T24418] loop1: p1 start 16646144 is beyond EOD, truncated [ 272.418596][T24418] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:32 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0afeff00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 272.443618][T24453] loop2: p1 p3 [ 272.448571][T24453] loop2: p1 size 11290111 extends beyond EOD, truncated 19:55:32 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x41, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x1100000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 272.485641][T24453] loop2: p3 size 1912633224 extends beyond EOD, truncated 19:55:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r1, 0x409, 0x0) preadv(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/106, 0x6a}, {&(0x7f0000000100)=""/25, 0x19}, {&(0x7f0000000180)=""/156, 0x9c}, {&(0x7f0000000240)=""/78, 0x4e}], 0x4, 0x6ff6, 0x9) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) fcntl$setstatus(r2, 0x4, 0x0) 19:55:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x100000}, 0x1c) 19:55:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x2001001000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 272.526470][T24481] loop1: detected capacity change from 0 to 185601 19:55:32 executing program 2: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:32 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x60, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x400300}, 0x1c) [ 272.619274][T24481] loop1: p1 p3 [ 272.622936][T24481] loop1: p1 start 16711680 is beyond EOD, truncated [ 272.629571][T24481] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x2002000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 272.670242][T24501] SELinux: duplicate or incompatible mount options [ 272.672997][T24510] loop2: detected capacity change from 0 to 264192 19:55:32 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000200ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xf0ff7f}, 0x1c) 19:55:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x40010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="646566636f6e746578743d73797374656d5f752c636f6e086578b6ad6277edf40ce455b199b2d3d3743d73797361646d5f752c00"]) preadv(r1, &(0x7f0000000280)=[{&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000080)=""/180, 0xb4}], 0x2, 0x401, 0x2) [ 272.717836][T24510] loop2: p1 p3 [ 272.721492][T24510] loop2: p1 size 11290111 extends beyond EOD, truncated [ 272.728928][T24510] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 272.735593][T24501] SELinux: duplicate or incompatible mount options 19:55:32 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1100, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x2800000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 272.790997][T24535] loop1: detected capacity change from 0 to 152833 19:55:32 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 19:55:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x1000000}, 0x1c) [ 272.837820][T24535] loop1: p1[EZD] p3 [ 272.842022][T24535] loop1: p1 size 11290111 extends beyond EOD, truncated [ 272.849760][T24535] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646566636f00746578003d737973746d842a6d5f752c63646d5f752c00"]) 19:55:32 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1f00, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x3000000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x480, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 272.919149][T24535] loop1: detected capacity change from 0 to 152833 19:55:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x3f00000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 272.971527][T24535] loop1: p1[EZD] p3 [ 272.975638][T24535] loop1: p1 size 11290111 extends beyond EOD, truncated [ 273.007135][T24535] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:33 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000300ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:33 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 19:55:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x1030000}, 0x1c) 19:55:33 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0xfffff000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="646566636f6e746578743d8e797374656d5f750434000000000000000000797361646d5e752c00"]) mount(&(0x7f0000000100)=@sr0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='exofs\x00', 0xc0800, &(0x7f0000000200)='ext4\x00') r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) r3 = getpid() tkill(r3, 0x1000000000015) sendmsg$nl_generic(r2, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)={0x1cc, 0x12, 0x200, 0x70bd29, 0x25dfdbfb, {0x20}, [@typed={0x8, 0x7a, 0x0, 0x0, @u32}, @generic="a49a3b328f5fd94c532ae705eb58b5ecd5eab022e9af85c9f3097c36824561c6b2ae907172cbc69ffd97d513f116419db8e2", @generic="eb634d1c3b1df661e0cc8e31e1f3eecf7cf786f800752bcfbf7163e0c4fb91ae836e1225e4c40ec01009a5533b2e8a6f508b882612d2ef988565fa26143d54275b6eca8986040204cb1b2a799e722d98951f676d9fdda49c3c0f76059b357afd342564adceb61ea9eb0aff8d960e3358f6f16eeb479cf28e6e4fb141ddd501602fc5e0be47edfa932f755ea3b33df651e1abd862a92f0667e8f935d235454ab1cf09d78180e4c7fa3c0956f3a38b506a767ee35fddd5b3bd2a26e42d41586766755d66fb", @generic="ef084a2a83b482c18fc42f50a088d1e93ff1ef6f8f7d4a3c53f2ee6a883efe08d85d5aefb2dcc98a83033de6618310665c6b420102ed4bf9ccd204ac95b4739de16e4d19e511e5a066b60ec5f904cd5eb8b816", @nested={0x50, 0x67, 0x0, 0x1, [@typed={0x8, 0x31, 0x0, 0x0, @pid=r3}, @typed={0x8, 0x2f, 0x0, 0x0, @u32=0x8000}, @generic="0d8c52d3a548d9f11e417f8a1d2d8de1b0982e05f76f5738cff4a46e146408eb85a436c401aaf0e683b5b71191b5d39cc991dbd70a7f84cf81972ad3"]}, @typed={0x14, 0x25, 0x0, 0x0, @ipv6=@loopback}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x48811}, 0x40) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000000c0)={0x7, 0x0, &(0x7f0000000080)=[0xffffffffffffffff, r4, r1, 0xffffffffffffffff, r1, r0, r1]}, 0x7) [ 273.023344][T24589] SELinux: duplicate or incompatible mount options 19:55:33 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x4000000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x2000000}, 0x1c) 19:55:33 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4100, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:33 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x5800000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 273.171025][T24629] loop1: detected capacity change from 0 to 152833 19:55:33 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 19:55:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x3000000}, 0x1c) 19:55:33 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x6000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:33 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000400ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 273.230822][T24629] loop1: p1[EZD] p3 [ 273.243974][T24629] loop1: p1 start 196608 is beyond EOD, truncated [ 273.250565][T24629] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:33 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x6000000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x4000000}, 0x1c) 19:55:33 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x7800000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 273.348169][T24668] loop1: detected capacity change from 0 to 152833 [ 273.392091][T24668] loop1: p1[EZD] p3 [ 273.398729][T24668] loop1: p1 start 262144 is beyond EOD, truncated [ 273.405168][T24668] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 273.464335][T24668] loop1: detected capacity change from 0 to 152833 [ 273.497836][T24668] loop1: p1[EZD] p3 [ 273.501891][T24668] loop1: p1 start 262144 is beyond EOD, truncated [ 273.508337][T24668] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/135, 0x87}, {&(0x7f0000000180)=""/100, 0x64}, {&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000000240)=""/11, 0xb}], 0x4, 0x46, 0xffff) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000300), 0x2, 0x591043) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r2, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000340)={r4, r1, 0x5}) 19:55:36 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8fff, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:36 executing program 2: syz_read_part_table(0x0, 0x0, &(0x7f0000000280)) 19:55:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x8000000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x5000000}, 0x1c) 19:55:36 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000500ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x8004020000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 276.154972][T24709] loop1: detected capacity change from 0 to 152833 [ 276.166817][T24719] SELinux: duplicate or incompatible mount options [ 276.191028][T24725] SELinux: duplicate or incompatible mount options 19:55:36 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xff8f, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:36 executing program 2: syz_read_part_table(0x0, 0x0, &(0x7f0000000280)) 19:55:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x6000000}, 0x1c) 19:55:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x40000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) getdents64(r1, &(0x7f0000000180)=""/222, 0xde) r2 = epoll_create(0x4) write$binfmt_script(r2, &(0x7f00000000c0)={'#! ', './file0', [], 0xa, "b7cc373c449bd2ebfb4c4bc98403aff92599d37b5b0046148aa46c2e6ea367950352ab42ea7d5c3b2193f0bb8306a098745cf031b7e7e8b7533c511aa5ecffd894da3968989aef283c70b313b7f0616bbb1f7260107b5308a1b1e96df17409fa128d9c7077b1a7415109a12bdc3e"}, 0x79) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x22440, 0x20) 19:55:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xa005000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 276.208370][T24709] loop1: p1[EZD] p3 [ 276.212726][T24709] loop1: p1 start 327680 is beyond EOD, truncated [ 276.219305][T24709] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x7000000}, 0x1c) 19:55:36 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000600ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xc805000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 276.310748][T24744] SELinux: duplicate or incompatible mount options [ 276.328929][T24744] SELinux: duplicate or incompatible mount options 19:55:36 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x17000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:36 executing program 2: syz_read_part_table(0x0, 0x0, &(0x7f0000000280)) 19:55:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x8000000}, 0x1c) 19:55:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, &(0x7f0000000180)={0xf34, 0x1, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) linkat(r1, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x1400) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000016e80)={0x0, "9d82c0698526a622afa05d196ff0c8df"}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xe0ffffff00000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 276.421002][T24763] loop1: detected capacity change from 0 to 152833 19:55:36 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000700ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:36 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x1c0}]) [ 276.468576][T24763] loop1: p1[EZD] p3 [ 276.472651][T24763] loop1: p1 start 393216 is beyond EOD, truncated [ 276.479104][T24763] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 276.500962][T24780] SELinux: duplicate or incompatible mount options 19:55:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xf000000}, 0x1c) 19:55:36 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20010, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='defcontext=system_u,contexp=sysadm_u,\x00']) 19:55:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xe803000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 276.573060][T24796] loop1: detected capacity change from 0 to 152833 [ 276.617590][T24796] loop1: p1[EZD] p3 [ 276.621947][T24796] loop1: p1 start 458752 is beyond EOD, truncated [ 276.628439][T24796] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 276.648191][ T1033] loop1: p1[EZD] p3 [ 276.651096][T24801] loop2: detected capacity change from 0 to 1 [ 276.652478][ T1033] loop1: p1 start 458752 is beyond EOD, truncated 19:55:36 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20200, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:36 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x6, 0x4000) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x68, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x20}, 0x8000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 276.664702][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x10000000}, 0x1c) 19:55:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xeffdffff00000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:36 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x1c0}]) [ 276.742385][T24796] loop1: detected capacity change from 0 to 152833 [ 276.743734][T24829] SELinux: duplicate or incompatible mount options 19:55:36 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000800ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/140, 0x8c}, {&(0x7f0000000280)=""/138, 0x8a}], 0x2, 0x3f, 0x7) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x20a80, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0], 0x2, 0x100}) ioctl$CHAR_RAW_ROTATIONAL(r1, 0x127e, &(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='defconte\'t=system_u,cnntexp=sysadm_u,\x00']) 19:55:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x10000120}, 0x1c) 19:55:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xf401000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 276.813230][T24845] loop2: detected capacity change from 0 to 1 19:55:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x10080000}, 0x1c) 19:55:36 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x80000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x592, &(0x7f0000000080)={0x0, 0x581b, 0x4, 0x0, 0x1c1, 0x0, r0}, &(0x7f00006dc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:36 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x1c0}]) 19:55:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x11000000}, 0x1c) 19:55:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xf5ffffff00000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:36 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x100000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 276.960164][T24874] SELinux: duplicate or incompatible mount options [ 276.976346][T24875] loop1: detected capacity change from 0 to 152833 [ 276.983418][T24877] loop2: detected capacity change from 0 to 1 19:55:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x20010010}, 0x1c) [ 277.023147][T24891] SELinux: duplicate or incompatible mount options [ 277.060937][T24875] loop1: p1[EZD] p3 [ 277.069132][T24875] loop1: p1 start 524288 is beyond EOD, truncated [ 277.075685][T24875] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:37 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000a00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfc00000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646566636f6e746578743d73797374656d5f752c636f6e746578740400000000000000752c00"]) 19:55:37 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x101000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:37 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680), 0x0, 0x1c0}]) 19:55:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x20020000}, 0x1c) 19:55:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x28000000}, 0x1c) 19:55:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfe80000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 277.180834][T24920] loop2: detected capacity change from 0 to 1 [ 277.204831][T24928] loop1: detected capacity change from 0 to 152833 19:55:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x30000000}, 0x1c) 19:55:37 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680), 0x0, 0x1c0}]) 19:55:37 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x17f000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@ng={0x4, 0xb, "3f7753f62ad54423279162a911a640de"}, 0x12, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 277.238118][T24928] loop1: p1[EZD] p3 [ 277.242107][T24928] loop1: p1 start 655360 is beyond EOD, truncated [ 277.248551][T24928] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:37 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000b00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfe80ffff00000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x3f000000}, 0x1c) 19:55:37 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x209b1e, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 277.338511][T24951] SELinux: duplicate or incompatible mount options [ 277.353894][T24957] loop2: detected capacity change from 0 to 1 [ 277.365136][T24961] SELinux: duplicate or incompatible mount options 19:55:37 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680), 0x0, 0x1c0}]) 19:55:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@dont_measure}]}) read(0xffffffffffffffff, &(0x7f00000000c0)=""/16, 0x10) getdents(r1, &(0x7f0000000080)=""/54, 0x36) 19:55:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfec0ffff00000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x40000000}, 0x1c) 19:55:37 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x400000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 277.437299][T24974] loop1: detected capacity change from 0 to 152833 19:55:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xfeffffff00000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 277.517573][T24974] loop1: p1[EZD] p3 [ 277.521627][T24974] loop1: p1 start 720896 is beyond EOD, truncated [ 277.524987][T24991] loop2: detected capacity change from 0 to 1 [ 277.528070][T24974] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x58000000}, 0x1c) 19:55:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x111e80, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x40010, r0, 0x0) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080)={'vlan0', 0x32, 0x33}, 0x8) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) splice(r0, &(0x7f0000000100)=0x4, r0, &(0x7f0000000140)=0x1, 0xfffffffffffffffe, 0xf) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="646566636f6e74657874ff00000000b0c8066573a8ae7421bee26066158930a17c000f4f0cffbd0a30c4ff47830964aab28563f4683ef33b4401e601c537cfbcd40dd5fafd1a61c59f4f03d1a50c406aed0f528e1a3c001d363ea24000000000d303f4f436d20fb4db4cadd7751db547c30dafe52d59b77df6ed2b74ac0c55a13e19522af5a1fb002f478020efded1008a00f933805e16f3fd785e95e73a7416f6c9d995d34674c1c2e2fdbf51b96946"]) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x800, 0x90) 19:55:37 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a001800ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xff00000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:37 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x600000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r1, 0x409, 0x0) preadv(r1, &(0x7f00000013c0)=[{&(0x7f0000000180)=""/32, 0x20}, {&(0x7f00000001c0)=""/42, 0x2a}, {&(0x7f0000000200)=""/255, 0xff}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/151, 0x97}], 0x5, 0xd89, 0xac) mmap(&(0x7f0000fef000/0x10000)=nil, 0x10000, 0x287d8cfbbed1299b, 0x10010, r0, 0x5ead2000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.advise\x00', &(0x7f0000000100)='\x00', 0x1, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:37 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ff", 0x20, 0x1c0}]) 19:55:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x60000000}, 0x1c) 19:55:37 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x700100, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xffff000000000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x78000000}, 0x1c) [ 277.730616][T25037] loop1: detected capacity change from 0 to 152833 [ 277.745370][T25040] loop2: detected capacity change from 0 to 1 19:55:37 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ff", 0x20, 0x1c0}]) [ 277.775265][T25050] SELinux: duplicate or incompatible mount options [ 277.789849][T25037] loop1: p1[EZD] p3 [ 277.794384][T25037] loop1: p1 start 1572864 is beyond EOD, truncated [ 277.800941][T25037] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x7ffff000}, 0x1c) 19:55:37 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf01700, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:37 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a001c00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xffffff7f00000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 277.874652][T25069] loop2: detected capacity change from 0 to 1 19:55:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0x80040200}, 0x1c) [ 277.924002][T25039] SELinux: duplicate or incompatible mount options 19:55:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) open(&(0x7f0000000080)='./file0\x00', 0xf02, 0x18) 19:55:37 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ff", 0x20, 0x1c0}]) 19:55:37 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0xffffffff00000000, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 277.967365][T25084] loop1: detected capacity change from 0 to 152833 19:55:38 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xa0050000}, 0x1c) 19:55:38 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a002600ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 278.018153][T25084] loop1: p1[EZD] p3 [ 278.022240][T25084] loop1: p1 start 1835008 is beyond EOD, truncated [ 278.028954][T25084] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 278.042911][T25101] loop2: detected capacity change from 0 to 1 19:55:38 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe1000000887700720030", 0x30, 0x1c0}]) 19:55:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r1, &(0x7f0000000180), 0x0, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x9) 19:55:38 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10000200, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:38 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xc8050000}, 0x1c) 19:55:38 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xe0ffffff}, 0x1c) 19:55:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:38 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x11000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 278.144764][T25134] loop1: detected capacity change from 0 to 152833 [ 278.151812][T25136] loop2: detected capacity change from 0 to 1 [ 278.168530][T25139] SELinux: duplicate or incompatible mount options [ 278.184355][T25139] SELinux: duplicate or incompatible mount options 19:55:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r1, 0x409, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x20010, r1, 0xdafce000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:38 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe1000000887700720030", 0x30, 0x1c0}]) 19:55:38 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xe8030000}, 0x1c) [ 278.224351][T25134] loop1: p1[EZD] p3 [ 278.228640][T25134] loop1: p1 start 2490368 is beyond EOD, truncated [ 278.235166][T25134] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:38 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a00fe00ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:38 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1e9b2000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 278.314414][T25173] loop2: detected capacity change from 0 to 1 19:55:38 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe1000000887700720030", 0x30, 0x1c0}]) 19:55:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:38 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xeffdffff}, 0x1c) [ 278.373785][T25191] loop1: detected capacity change from 0 to 152833 [ 278.410626][T25202] SELinux: duplicate or incompatible mount options 19:55:38 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1f000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:38 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb0700", 0x38, 0x1c0}]) 19:55:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 278.419827][T25203] loop2: detected capacity change from 0 to 1 [ 278.428051][T25191] loop1: p1[EZD] p3 [ 278.432285][T25191] loop1: p1 start 16646144 is beyond EOD, truncated [ 278.438911][T25191] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 278.519134][T25220] loop2: detected capacity change from 0 to 1 19:55:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x8412, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:38 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000402ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:38 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xf4010000}, 0x1c) 19:55:38 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x41000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:38 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb0700", 0x38, 0x1c0}]) [ 278.581207][T25171] SELinux: duplicate or incompatible mount options 19:55:38 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf5ffffff, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:38 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xf5ffffff}, 0x1c) 19:55:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x8, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 278.630822][T25245] SELinux: duplicate or incompatible mount options [ 278.635332][T25244] loop1: detected capacity change from 0 to 152833 [ 278.637590][T25242] loop2: detected capacity change from 0 to 1 19:55:38 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb0700", 0x38, 0x1c0}]) 19:55:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) fremovexattr(r0, &(0x7f00000012c0)=@random={'trusted.', 'system_u'}) preadv(r1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/231, 0xe7}, {&(0x7f0000000100)=""/31, 0x1f}], 0x4, 0x4, 0xffffffff) 19:55:38 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xfc000000}, 0x1c) [ 278.693839][T25244] loop1: p1[EZD] p3 [ 278.699586][T25244] loop1: p1 start 33816576 is beyond EOD, truncated [ 278.706223][T25244] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0xf, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 278.764394][T25279] SELinux: duplicate or incompatible mount options [ 278.794885][T25278] loop2: detected capacity change from 0 to 1 19:55:38 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000003ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:38 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xff8f0000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:38 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xfe800000}, 0x1c) [ 278.812319][T25279] SELinux: duplicate or incompatible mount options 19:55:38 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000", 0x3c, 0x1c0}]) 19:55:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x20000, &(0x7f0000000140)=ANY=[@ANYBLOB="646566636f6e746578743d73797374656d5f752c756f6e7405fd743d73797361646d5f752c00"]) 19:55:38 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xfe80ffff}, 0x1c) 19:55:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x11, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646566636f6e740200000000000000656d5f752c636f6e746578743d73797361646d5f752c00"]) 19:55:38 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xfffffff5, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:38 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000", 0x3c, 0x1c0}]) [ 278.905260][T25310] loop2: detected capacity change from 0 to 1 [ 278.942666][T25302] loop1: detected capacity change from 0 to 152833 19:55:38 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xfec0ffff}, 0x1c) [ 278.987391][T25302] loop1: p1[EZD] p3 [ 278.991736][T25302] loop1: p1 start 50331648 is beyond EOD, truncated [ 278.998373][T25302] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:39 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000204ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x40) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:39 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x100000800, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x28, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:39 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000", 0x3c, 0x1c0}]) 19:55:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xfeffffff}, 0x1c) [ 279.056600][T25350] loop2: detected capacity change from 0 to 1 [ 279.076214][T25356] SELinux: duplicate or incompatible mount options 19:55:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="646566636f6e746578743d797374656d5f752c636f6e746578743d73797361646d5f752c002a9e62aa696da2e190f0650f3cf9d119ae03da59639837ad2fd6821009419a81f9f907004e833bcb1cfeda50b76a5aa97b5aae46d5e6c5390b4e54e49befdc1c0af8740f6ab8920fdc5fd6e4a5665f44c88f57ffb6a13d37a0af2c7501a52068ba8365a7e61e68c59cde2406ef4f5f1e5f5d39c3491af65eeae0acd7a36368e6bc0e167a11ebe5e152dfd623598a36f434f0d7b5213955311213c162d1b2c0eda709"]) r2 = openat$cgroup_int(r0, &(0x7f0000000080)='io.bfq.weight\x00', 0x2, 0x0) fcntl$dupfd(r2, 0x406, r1) 19:55:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x30, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:39 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1b1201f000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 279.138057][T25366] loop1: detected capacity change from 0 to 152833 [ 279.147038][T25375] loop2: detected capacity change from 0 to 1 19:55:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xff000000}, 0x1c) 19:55:39 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb0700000000000000", 0x3e, 0x1c0}]) 19:55:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x58, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 279.206647][T25388] SELinux: duplicate or incompatible mount options [ 279.229940][T25366] loop1: p1[EZD] p3 [ 279.234067][T25366] loop1: p1 start 67239936 is beyond EOD, truncated [ 279.240714][T25366] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:39 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000604ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x60, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xffff0000}, 0x1c) [ 279.255500][T25388] SELinux: duplicate or incompatible mount options 19:55:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x100000001, 0x0, 0x0, 0x810006, &(0x7f0000000080)={[], [{@pcr={'pcr', 0x3d, 0x32}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:39 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x400000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xffff80fe}, 0x1c) [ 279.310847][T25407] loop2: detected capacity change from 0 to 1 19:55:39 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb0700000000000000", 0x3e, 0x1c0}]) 19:55:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r1, 0x409, 0x0) r2 = openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={r2, 0x7, 0xfff, 0x3ff}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x78, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xffffc0fe}, 0x1c) 19:55:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xfffffdef}, 0x1c) [ 279.402113][T25430] loop1: detected capacity change from 0 to 152833 [ 279.423648][T25443] loop2: detected capacity change from 0 to 1 [ 279.438612][T25430] loop1: p1[EZD] p3 [ 279.442778][T25430] loop1: p1 start 67502080 is beyond EOD, truncated 19:55:39 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb0700000000000000", 0x3e, 0x1c0}]) [ 279.449400][T25430] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:39 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a008004ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:39 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x7fb07b4bf000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0xfc, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xffffff7f}, 0x1c) [ 279.521452][T25463] loop2: detected capacity change from 0 to 1 [ 279.523491][T25462] SELinux: duplicate or incompatible mount options 19:55:39 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055", 0x3f, 0x1c0}]) 19:55:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xffffffe0}, 0x1c) [ 279.610462][T25479] loop1: detected capacity change from 0 to 152833 19:55:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x103, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 279.662167][T25489] loop2: detected capacity change from 0 to 1 [ 279.697578][T25479] loop1: p1[EZD] p3 [ 279.701612][T25479] loop1: p1 start 75497472 is beyond EOD, truncated 19:55:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:39 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2001000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xfffffff5}, 0x1c) 19:55:39 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055", 0x3f, 0x1c0}]) 19:55:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x1f4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 279.703529][T25455] SELinux: duplicate or incompatible mount options [ 279.708245][T25479] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:39 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000005ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 279.792913][T25519] SELinux: duplicate or incompatible mount options [ 279.805860][T25526] SELinux: duplicate or incompatible mount options 19:55:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0xfffff000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:39 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2020000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}, 0xfffffffe}, 0x1c) [ 279.834189][T25524] loop1: detected capacity change from 0 to 152833 [ 279.834972][T25528] loop2: detected capacity change from 0 to 1 19:55:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x220, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 279.879382][T25524] loop1: p1[EZD] p3 [ 279.883677][T25524] loop1: p1 start 83886080 is beyond EOD, truncated [ 279.890341][T25524] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = accept$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000001180)=""/200, 0xc8}], 0x1, 0x8000, 0x3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000180)="0c56c26bc2f754058c013e7c6451e5d567fd79eed342556c49653955b1bfcc2bc25a545c1d91fe74a8d1dd97e5d14c34872f8048ba8842d7b30afd4981defaa7ceee07f627b59e54695e5d81657a7f1d203259b4b018ad2e7a34c3d3f7beae7068687eb6632f2b29e5b5c727004879637099e9d61fee3bfe84b3431480ff8c97bd83698b17b080a0b638d3b2a574274f74c4471ae21a16af204f226cc556efb3a105fa3502965e12fa13a5b28c67de6822f283797df3a4852e1a1a73e2a8eca06a7f791f9a642a92a3e1695f862c8c2f9689754fb2a7b3b8d688dd6ba70c860de690c16266b53dadac177f3cfdcaf3b9910ff4eb2ca601f98bf0be74b44c7345eb40be308c2cce8209970414678c2b2ca23067d7414d3aa1b1678efbfec43230644f9e609899c243484ddb9a7ba5cf888c8412ca291861a9126f895e80abdc4e7a37ab1818156b6ea5e263539d77fcfcd1648694db8686f25618b13803d1dcb62c899329d315e8c4d3e40ebc649e054073e834a8001d6cbfe6a534b8e5a1595b2f81bd43a9918abb0f55b4f64c39fbe785cd94fce707aff0ecd0f454753c980bf530c807f20c641a379438efa4c4cd777860093e65acf8916b14df1bef9079b779be0f0eca9ff259e1acbcb88c7cec0f62146edf90c6cc0e7d43a9981bfd1998e96d64d7029b8bf956ba852e7ab282e5bc0da59f577da548faa779eb4e1eb28479cc570e78a303939066e2e37d581a2b8b9eb0dbf6f37b7578a3040d30bb9cebeedbaea2fe36a0cd1300044cc9f256a484c993ce48a310ed1043ac3ef83b60128a329b245ff5faa7bab4247e50d4746f69c5ac503381c93104fab7d9ee7be4095293d0498b308b13f39595168ae9a644b4a578676b2982312a0c39bf7c31cac79ac845513afe911591c43c1a8a32d5e18ab0ca77ccec683ec60d9e36d447e0cad68dc3bcb1865b194f49525acef559b93e4ee5781fa03bdf4ffb672fae523535e0f7166d6d91d6de47333ce06369f3ea5063952efc069d760d24c03cb71913a993cba086901166834651f64f0d434d8d5d318846f2184aab4879274a85696523eab743a735b690a05ca05906532d86d476fc46d5021c2832aeabd9c48c6af885ab05be4b4020861f56e2038b3abdea3374642b6049b2ef7756f06cab5950ff3d35462bf9838650bc058f7faa09ecf4f2217e1dc8ca60ef86987829d8cac41960af28f6387c0103d2c9080e1e651aa78739b96a1197c5d13c7a819094dabc190b94530611002e6cca7e06a6b4654cb9564cad926f6a9ba8a4851a23bdc56681501935c8e28d375a0d2029603badd144b12e5d219f423878b1310181552babab8642d277b88e08640ec35db8ccceb393a81e149f168bda50bc837cec2282bcc4226c0da73ebf87c2acccc21b0d75b300997628c7888d400252533ba66b8ba64f42be25387a52563382408169cb0e52e1de83f4f5a8542e48fcb43cbb4996cde40092860b1174f4760ade6a636540787a5a9a1ae44f110d2e0462007a1e885455d3a0d93c2dfbd4ab4631db1fe65edb36bc4adae6837728ce4a637f7acec8bb716dbf798d956ccdf47fec7a5ca730e4f0a5fe6003ec2cf8777b75cd163ed902069563e75b69473893e43d7ece5a8630619dd427214fb4101c7c0e2b449fefc65e4388e7d1f16564436258a998739139d6eb15c585fc6356695e07d7034fb692da9645fea7adcfce4b6b47c7170b3ed2f0602cbb3ae3e1103a8f1afd1d34fd987b2d706465da151defe281c0967754589d4ed23685732b27c588ba6af8f055557dd7263ae4790ee859529ca5957560e55f8d91a39e581a8d36827da7b1171e4388c1d59a62633a2b0c8f30f11c1fb289b7356427b50817116b842f9fa61a7e54210d263aa0746078907555584f8861d6e1b20428202e464580f4bf5825a450c4ff21748d821c3908c82aebbd86cefc4f90e86a054e8fb29500a32ac53ee911286a9baabcab440db217cd5e795951fcc4357bfa8e48a51b37afe9d4aa2a27aa866d96e40021a5d504cd220b8ed64e8be4b880c2a6b09b5254eadbda81816237ab9a86130bfe01fe6728326715f6686a5e191450b0103e73a00ac5edd75bf2c857dd84b332cc3a124edbb995c1b28280b7efc7da03d4cf76bdc174fca47d5bddd5a8b7839b1813aa8535e5b21aa6a6c19907ac3548d926b1869a8b531dfac1210c6ba260085b2d607f9cf9df35747fcbb1eca7d575b1ed3d8be78f0b1c139fdc77ab23430b66758fd9be37464aad1cce7fed9835eec32db463cbe3b0fbc4da2eb118a0d83da3738579c7c076282433f732a283166a36d64a81047d66a7061c9be150226e7616c384299fdf0d8e2b7e628c8304b58f0cbd513bb779ced897e2a55298d65436bc4379c77de1c4f3908902e143b870ca8399cda44f31a1865d9e0afc5278f9503b1c6947d4d6553728b247275099e617f82afa75e39e007e54d06b70f47cfbac19577606854844bb31e22229f5b2acd581804b2ecaeae4da61a248defb77afabf53934b9201a1d95170f95b4c0be7c09977c6914e43cbdb56a5d389b304cabdcf6a9f4fcf1e1526b293893116d975d9aec3d3d9a0fb7f7fd6a721847df5d0b3b50c60a2d6d6950a29367f77ac57e5ac97f919d556278a23e3a02714c5714d21a67d1150db56788467125bf8e3ea9437795be00bbfb4568274043777ff3781d79ce70015611356e83c6b9a65216b44a247e2ed4efadce7fb4a8a9d38499a93f55036c36e2b10cd21d61f9b887059dfe74650289fabc3c3aea98e14d0202b746f2e6bca196cf3aee275459ee9ae4bd7e48e0eeb169eaff9c94203adab1c2fb55925b05dd1143411759d05094a1ebee0b4452358f26ef59f26fe2dc6890bfd9b2cd7a57841950d678ba29ed86015fbe1d6047488e1f95fb9b9ff84fba303ad3ca7a0a96e492464c52b31ed4bb51af81fdbb1b694affc1dfb8ae5df290709521c929d5fe8b1953a579a980ea29070fb960e00bc684cca16a0dcdfe713da031491973dc2917d23b149348e4fb9c79f88c5dac401858af990885830792322a309fb29fa4f53d9db5db7adca70cf56327c9edce660bfce9e61d528223a23052765ac0b0990e079327f3182cd17729c01ccf970282b8d001c5620896f88fabd027dddaa2e7ea7b51bb32655f1e8f13f08519227dc9313da61436e2f544f03a3ebc5333950c64175049f88dc71382c65eb6788a614fad41948b111aaf3b76a32c774025c787cbfc0c08b44d83f8e5bdac4930a4356648fbd34af25dd65933e9d979590e597cb08f62f6eb32c45140760bc921ebc2a5040cc73146caa6838a44afceab2e16139270cf48069aea90801b852342f64ba9212d5603387fda4bc8c9257fbf6556193f80a5e6bfff25dc9426fd5ead52b1f0463efb0ef8cafda61c97ccc6a369535535154a90eb74afbc9aa39fc28d3a9edce28f4d54acd8e54ec053d4c033043d957138695236bfe6ea1b1cf6d0d0233f4136636a0bc932532e42c380d5eee9ffd498c585694ea879bcb71de9796b546f60e8a67796235aa6a2950f0768a392f0eecb874edb83b9a9afea4251f30677b2c3e054c41fc8ad3671e6066008f5cd8ece868ff2a15d2f7ba9f3fda8c976b48aca11c6b949439ee56445e7c06490238bf108dfca0e381ab22f47cdce96f8a2ee472d1a7a62927f53ff2cf239071fb346c88216500949a09af7182b309ed9ef804ba2b85f283a757dc7f911db5fd50f71a32e3a7d2d7cf2a9c7d2ca28e39c1fac9ea75f15a0825ff87497c460d129275d47d4d8844760ace8d2616e464ec35f84bd9f35d629499ad1a14c0b39c08cb70f9d68fbe3f2cd5558cf78c7628d21130f041a3ddad36004bd5827bb4e3fe944006958089f7e9f12164fcabcbb0d329b2a172c485e8eeed2b00beee24e892c0af9659e865b52110001b297f836d05572f8fceab56e6b2d05dd4ce03cb9abb3b711c0cb747bb838f47ead9aa72330a0f850469e875554aaf4270b54c42585a4189c75466281ebaea2bc7478356dd9860eedbc2faef300f12e5ea26a868a22ca8dae535e7e6372ef5a93d5c58aa8b1918003f40a17a16124f8db109a45a270c3a1774c48aec11475bd6d6285a55b0b030a76ba9e0284708a524cdcb1ab4481f2f69b5c2e0a5500d347b038eba28d81bdebcc62549c0acb1207307317113df27cd972162d6e7ddcc4342b51bcd12f7bb7d86131cabfff1b72a8a021999d4721f3772c4f84c0249ad385e0517e251afb919b3446a7541797499db833e697825f7686f0602c76d94a029e8e4baf8da4dcc3cbe7dbf5ebda082bf64ec1056cb969d493086a355308a42b14eff869d60d8acff3f94724357f45ea8b23c1701a7c121a9fcce80c24f1a4fd23b0de293e3e90da1478851bbdf9a545554551847f9e106b77fcb8447e8a77ba9ade49e5bc79919a7c508fa7229d2b1f26cb7adc26939e7f204f8983fdb9fe909fa2cf0e420e18254e6b881201f704b25b22b34a450aeb2e8ffc7f996911bd8a3d8294aa80423c23e03dc977a86de8802646dd2a25a9ac3503b44f78a4a6536bacff489e47af17e1fd2515cf8d97b85241fb24629830048b297b8f6b48ec7b0e1b7073ecc181e4409f16d4af9a60a6f9ccfa7815def74322efe3081f2c9b7843326f1aa22de545befa448f96039f22e5d33fdb57e84e3193d36850d7d8dda85e84c6c78968fada7ce49722a8102768a8e96c17b3b715f7cecf5d5250c3b41f5701daed7d2c28afad45b6f8306bb2e076ad2f9fc177c86a9bd479160b77100aa54707dd4aba4ff3826473e66eb2eab87c97e6be869f672d48ab3d1b0323dbd6209ed46521ff563396cf66ee11d95163f3b7abf79334c8b330c1c3b1ea94eda6a76fd09be8b71f90f91b4b2b2d8d6902ece8e0ec1a35a20cc9d2339b47da1a5c4214fc0c68d3d73b2d38f8be661a06ca4b47bd998d40b773b859496ec390a20d76bfa480cabea3340f02e31991f0b877ce5af8211e314373dadcfc44df059b34edaa04e51aa360b42fef5137a529f7ad8073a5862bdf1f621f311172fe14e064571025fcac86640509f504330fd6f35050ffa65f64d18aed52a9341ce2ccaafbee893aea3ccdb2a792031604a6685bfdbc0f34c185008c9e369da5e36f09b6b47e04f8de2c66548b3582af6f02e6803c01f4090d49042424868acfa83a765615cc6c904f949329372041f362518369c562435f45809e1171d262b77212027d4f86a396d436d2c4a3c7a947df6fe33933fcecc0541a86c88b08f6d48faab804249dca32c5a893c63d891a61dbbee5063a830e8ed932fb71565b7dc17cbb1f189669ee16ccdc9c58dcc123e15c70bb9554689972efc6d4a9d2c30b817d82a3ad43b550eea3a2606d675317a573ec4ced1b5a34872f0bc44f95b8e33ecadb4b7c625a7fbc43cddbf6015f4546e0ff95cc32a552348894dd8aef2e84846f7bfc52016cc1729321e6b5cb8c697ee3b64373a4c7e90150c93311d596750b353041e09f2f2b29d7ee6a454a997a2d3be70f2c9b88bddf4fc77b97e75f9ed28647e08edec1c7bb937643dfa0081ead77b961dffffe38834406aa8af8077d93432605a2c0c63d31dc71a84ebfb6895be8ddc5e2f3fdb642584cfe3c5f7741bf52577feede7a04ca0b0f6a7a4af07bdc4242947081bc8388b86410c10fe8c73664ff99bb26d85773afd8892e0726c16bd3550d820c4e14e6aa00a44f899e85d5ccf05d623cc339345ba6e665a3ee0f37af0beca5992b953d08d8456d3739", 0x1000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='defconteem_u,context=adm_u,\x00\x00\x00\x00\x00\x00\x00\x00']) 19:55:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x18) 19:55:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x300, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:39 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:39 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a003105ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:39 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055", 0x3f, 0x1c0}]) 19:55:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='defcontext=rys,context=sysadm_u,\x00']) 19:55:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x301, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:40 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1b) 19:55:40 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000001000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x3e8, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:40 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40}]) 19:55:40 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x64) [ 280.049385][T25577] loop2: detected capacity change from 0 to 1 [ 280.076063][T25591] loop1: detected capacity change from 0 to 152833 [ 280.090939][T25590] SELinux: duplicate or incompatible mount options 19:55:40 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10000000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:40 executing program 0: set_mempolicy(0x3, &(0x7f0000000080), 0x9) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='sysadm_u', 0x1) mmap(&(0x7f00004e9000/0x4000)=nil, 0x4000, 0x1800002, 0x12, r1, 0xe0546000) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000100)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r3 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r3, 0x409, 0x0) mmap(&(0x7f00004ec000/0x1000)=nil, 0x1000, 0xc, 0x11, r3, 0x9b490000) [ 280.128340][T25591] loop1: p1[EZD] p3 [ 280.132314][T25591] loop1: p1 start 87097344 is beyond EOD, truncated [ 280.139015][T25591] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x500, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 280.204353][T25618] SELinux: duplicate or incompatible mount options 19:55:40 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000006ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:40 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x200000dc) 19:55:40 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10100000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 280.264011][T25628] SELinux: duplicate or incompatible mount options 19:55:40 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40}]) 19:55:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x5a0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="646566636f6e746578743d73797374656d5f752c636f6e745778743d73797361646d7f752c00a2a3e513ddc6c59a7e4626ae5b4d2b39cbe9fee7935cdf1b6c5b6b5521539fccff60c22522a94e833e28cc0972c39e23466fa37b5e930a992317303378a258300313b3909e0b08a8f925cf1fe13d06a058cdf3bf515c3225095b9e430b76592248a3e9b65866099f2b8e3b9385dc9622072e0616fe27097973d9424243072086ad806bb4b63a3b8b7b14b6a13691ed48ce6a98d295d273158ac72cf464ed10cd933af5663753ff502aad0f5c02b8085bfbb032fd8b2260b8c384fc8d0c1bd9df9b58e16d2f104b294e66f61d5774c500101d62"]) [ 280.326222][T25643] loop1: detected capacity change from 0 to 152833 19:55:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x5c8, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:40 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x0) r1 = accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) shutdown(0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000040)={0x2c, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x2c}}, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000002ec0)=[{{&(0x7f0000000240)=@in={0x2, 0x4e22, @remote}, 0x80, &(0x7f0000000300)=[{&(0x7f00000002c0)="683ee47933e96343bbefa242ec07fce1bff3e4d2698692a1c3076f88586e054c48770c", 0x23}], 0x1, &(0x7f0000000340)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}, {{&(0x7f0000000380)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-384-generic,ctr-cast5-avx)\x00'}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="44f33548f741009fbc68c835eba235bff4a80983ad817d0e252ca5da07b119a7b6f022a3c8fbc85533122df549b794854179d32b79bd6f9f54131f60d4f00066e7819713e82b48041ba5166b93c786be32cb485b67d07c17e03aa82b55f9208b37c66b6289ea5283463f841b10a7d9ebe30f2586102d2431afc24f357e1292e16a5b827049863840c910b84341aea72f522b94a014ae78c1", 0x98}, {&(0x7f0000003000)="e864d261ae125f4ca706a00ce6b51c18e9d0ef36d776c4e2b01ac64575d13fe5164904a8529c2d94082b14b9f8bed2f8e9c33b5230603aee24dfc66f51305e863b9b3d9dc7486844bcb1ee964513b536a7035fd8f5676f7c420b9d851a42fc32bb69506f2d", 0x65}], 0x2, &(0x7f0000000580)=[@mark, @txtime={{0x18, 0x1, 0x3d, 0x35f}}, @txtime={{0x18, 0x1, 0x3d, 0x400}}], 0x48}}, {{&(0x7f0000000600)=@ll={0x11, 0x7, r5, 0x1, 0x7f}, 0x80, &(0x7f0000002980)=[{&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000001680)="c7be0dcd740fd53afc59d33bbfa9d3a56987b905273fb7dc9323d64a2ec639d08a0d85f27ec982352a749e4dce2818c9c54e75c53ff534ff99b5bf8912dd89ae8a3bc578bbcc57719b23e6811f442113f7358dcf2d95b5c52444e814a793b8853aff9d70e8ec316dd447988200b09db1123e078556a726340192b5cabc3b8dca7f1a2c58be6a8e236391e368704d6624399065777f9f2fb812c1565b10aadc7b21d6663188e29283507d72574c0ba5e66465eaf361ec5d542159a9239c19956125afb47f7b200d5e4cd66e23a2968b0bbd9e5bf0c339e84c203200748aadf58e809f90ea629679c50efc7abe", 0xec}, {&(0x7f0000001780)="d48698388ca2492813d8a0cd961ad5746c3c7aad1e85ed3ad6a478b8e75fae26f95b5ed1c4c6ee1a63b706c12165b9bfc5dd", 0x32}, {&(0x7f00000017c0)="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", 0x1000}, {&(0x7f00000027c0)="63e9cff8d2520f7be37c57973fd43c01b84a1c76f594648f729c9ab7fd9c2ca0582f8b4597b60a96030a738fa121482e80c9e61d689061549d00800204e7f42b9f4adfc4ca08c4cb3f4e74084e30d53072eae2c03739edeb0f356b86497c8ab081065d318f878e8b2130888678fdb636dfd7c9ed23ceba96dadc2b1d14bfba5c57a19f0471cc237f88feab1ef5ca58267452ff0c8888f8c77fdf72608792ae27c63016155be6c47a5d38f8360f2fd5a6da35e866a01c3c5ca742f47f831c0f95554e8e3bb8d7a5d18f3552d7eb11c485ad008379ea46412f0316403b549735770558e85869686092128f65ab974e", 0xee}, {&(0x7f00000028c0)="3813f2d9aec4a8", 0x7}, {&(0x7f0000002900)="4026efeb2f8ee9e43fb1581ada0530ce2e29427fc7ede93bb08e01876d56f0e75dbe36f9103f5de6b5cd4f664b08cbcc2c814e87e2a9d8c298971a027afae1adf93af7e5c75ba10607b5315843cbc1689da897bb9a38dd2b4a8a2b29d1fd959abc", 0x61}], 0x7, &(0x7f0000002a00)=[@timestamping={{0x14, 0x1, 0x25, 0xf67}}, @mark={{0x14, 0x1, 0x24, 0x400}}, @mark={{0x14, 0x1, 0x24, 0xfffffff8}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}], 0xc0}}, {{&(0x7f0000002ac0)=@vsock={0x28, 0x0, 0x2710}, 0x80, &(0x7f0000002b40), 0x0, &(0x7f0000002b80)=[@mark={{0x14, 0x1, 0x24, 0x7fff}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x0, 0x1, 0x3d, 0x6}}], 0x60}}, {{&(0x7f0000002c00)=@nfc={0x27, 0x0, 0x2, 0x2}, 0x80, &(0x7f0000002e80)=[{&(0x7f0000002c80)="11dd8d140e6127b42514c9c25acd6ed52b559fbc76cb63a9846b00db643782ff921cc5e7b468898a3e58de0de097927e9420e76e81e6d2359cf411cefce8265ddf90b81be35b960af47a48613ad0fed09c073e5ce55f5ba10040b04dbebe646e7f2e3da868f5650047a23c4442c04a6955ce33e20996ef68", 0x78}, {&(0x7f0000002d00)="b8e973dc30a74c4583ed729f05999542851e8307d5fd9c9aa60c4d542cda91bfe1a09f26846bfa110ea45bfd3614ddb95b49b44dc831a48ba52a39bc2211553076d882f3042382c78084ddf39acd43f7a3fe72009a70a5eff9f17fa5a7bc41cc3b7729cf63595885a20c13517845043a6bf1da711e4188224576a77c4c3d8fe43ea0e37794600545c75ace5f5e61c1a53443fe8f78e9de010c9c0c0d46a9ef6def36accc7b5eb3", 0xa7}, {&(0x7f0000002dc0)="563dc331171928a1944d975a79e04045ed61bf9a6e2d85e71580f81eb05d4415c3da51b9b804a7234a766216b73689aa18ad6ef5063fce0f3a5477", 0x3b}, {&(0x7f0000002e00)="6d60fba096f59876275317a7bcd8e88fcfbaf85a119896f90d4b7bd33d420392dc10fbf82f8f658dd746d2581ce2006620881d41cd2edb15097208beb764ff2408fdfc34b1eb118ad0", 0x49}], 0x4}}], 0x5, 0x800) setsockopt$packet_int(r1, 0x107, 0x10, &(0x7f0000000080)=0x7be390b3, 0x4) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r6, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0), 0x200100, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000002, 0x100010, 0xffffffffffffffff, 0x45ee7000) setsockopt$packet_int(r6, 0x107, 0x11, &(0x7f0000000100)=0x400, 0x4) r7 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r7, 0x0, 0x0, 0x4000000, &(0x7f00000000c0)={0xa, 0x0, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0x1c) [ 280.371509][T25643] loop1: p1[EZD] p3 [ 280.377820][T25643] loop1: p1 start 100663296 is beyond EOD, truncated [ 280.384531][T25643] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:40 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x209b1e00000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 280.434591][T25668] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 280.460470][T25643] loop1: detected capacity change from 0 to 152833 19:55:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) fchownat(r0, &(0x7f00000006c0)='./file0\x00', r3, 0xffffffffffffffff, 0x800) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r1, 0x409, 0x0) vmsplice(r1, &(0x7f0000000640)=[{&(0x7f0000000140)="6af1d1fb1d96807f61511ea70a963dd794b4847a8f2e1e9d67255c76c7cc691e57e997b80f6bacda4c91cb2552c0978fb4741f584af7cf587de6c89c90d71a02d02551c933c1070fa8e24ccc3b3ff2e9aa6c81f909", 0x55}, {&(0x7f00000001c0)="2d9156a040ce7e73e6bec7812054151bae59a8fe1552ae7089ba7bae57ff13a3a299b47d1b33e2540996b3170bb172ae49e987d3cde70d9756b4730a22d39bb3a46bc3718dd927f4cd46ae45ec0f445c4c31c11815674569c46f051f55779b653576fde728c43ce9ad5edaa15ef8056ba60096b7a7f51549ed8da43b7cf54b96d5bccbfbfedb435fe5bf6a8e", 0x8c}, {&(0x7f0000000280)="a1bc6d3c21dc7e4302d0b237da504f5fcdb5c8123f2f9462735cd724701ad10f763b3a5b1eb204b208615cc3d50e2a7d2100442ac170397226cde719fc34586897856f392f8877a508e984753fcacb39a837d06ac2", 0x55}, {&(0x7f0000000300)="7ab14de87a862faf215e88e99d842376394ce3fe479b2ceb6a00fde51e1708fa0cb55f9f6baef6901d066c1445c0edb50d594722166be88650f5a8885e6259e541ae2a1d70e8b00c94ec9fb0ae795c89", 0x50}, {&(0x7f0000000380)="9aeeec30b44ba0bf6a74ab145627c12436e9d9da83df112ba446607e84e635e829a9d9dbee619d3ebd377c98f03567b1dad19939c17c53895857b1312a0f5eb7f6f26563cb8b34439426d86d60786477a54ffeaba0ab51896beaf26e6eea271355a6d2b7638e710a22b331353e4b670ca41ab63b9a22c425541b4459698211d81a7345f7427d4523e5e040cd6583f8a9c5a2571d4fea26acc40b40a5133b5a7f73585fb5bd241558ea5697171e909b311d5ee753903c69f634cb337e1f7cf86c03cca1828a3c14efd71981f879e12b1ddf1cde1cac4cbc1fa4f0b455df8ec13ad92e9acc93f74362e3db12290c0d", 0xee}, {&(0x7f0000000480)="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", 0xff}, {&(0x7f0000000580)="026419677d926c53b832f5926c30c9fdbbc0faa24b8362626f749ae79e48099618d967126452c065fdceab3db6e353fa9a5f4059120ca3aeadaab36032aecc3547e96c1c84ae8cd2cbeb4bb1c712d432833fed4544a39f2c6e6cb8a40d5248e1dd41c903c7b681d01427cf2240ffbb315822b2d5df30c276650ec6db62c25ba2a5787170bb5b", 0x86}], 0x7, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646586636f6e746576743dee4b09e93c5492c62c636f6ebdbd0fa12c2bf76985fc587465785a3d78794e6d0d63424e26eb159dda574eb71534d538a531e05572e8476fe03168711ec86e2c3e97982135b57327099dde72cd57285c7eaf5f2e4a7c8c65ac2dfa387fa609c99b488432eac7834373ae7f4d81899be6917b9d5818acb6ed08"]) 19:55:40 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40}]) 19:55:40 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x60000000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 280.489665][T25680] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 280.530573][T25643] loop1: p1[EZD] p3 [ 280.538967][T25643] loop1: p1 start 100663296 is beyond EOD, truncated [ 280.545672][T25643] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:40 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000406ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x600, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:40 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) openat(r1, &(0x7f0000000000)='./file0\x00', 0x20400, 0x68) fcntl$setstatus(r0, 0x4, 0x42000) r2 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:40 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x70010000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x700, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000080)=""/53, 0x35}, {&(0x7f0000000180)=""/193, 0xc1}, {&(0x7f00000000c0)}, {&(0x7f0000000280)=""/175, 0xaf}, {&(0x7f0000000340)=""/239, 0xef}, {&(0x7f0000000440)=""/67, 0x43}, {&(0x7f00000004c0)=""/195, 0xc3}, {&(0x7f0000000100)=""/60, 0x3c}, {&(0x7f00000005c0)=""/193, 0xc1}], 0x9, 0x2, 0xffff0000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:40 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) socket(0x29, 0x0, 0x1) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f0000000040)=@v1={0x1000000, [{0x0, 0x1}]}, 0xc, 0x0) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f0000000080)) 19:55:40 executing program 2: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a030000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:40 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf001121b000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x810, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 280.697823][T25724] SELinux: duplicate or incompatible mount options [ 280.728644][T25730] loop1: detected capacity change from 0 to 152833 19:55:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@barrier}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2}}, {@data_err_abort}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x7}}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) 19:55:40 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf0170000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 280.744738][T25738] SELinux: duplicate or incompatible mount options [ 280.752468][T25737] loop2: detected capacity change from 0 to 128257 [ 280.782343][T25730] loop1: p1[EZD] p3 [ 280.789324][T25730] loop1: p1 start 100925440 is beyond EOD, truncated [ 280.796105][T25730] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 280.807244][T25737] loop2: p1 p3 [ 280.810808][T25737] loop2: p1 size 11290111 extends beyond EOD, truncated 19:55:40 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000007ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0xf00, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:40 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x3, &(0x7f0000000000)=0x7, 0x4) lseek(r1, 0xffff, 0x4) 19:55:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 280.839463][T25737] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 280.855636][T25763] SELinux: duplicate or incompatible mount options 19:55:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4010, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) [ 280.894880][T25772] loop1: detected capacity change from 0 to 152833 [ 280.933081][T25772] loop1: p1[EZD] p3 [ 280.937840][T25772] loop1: p1 start 117440512 is beyond EOD, truncated 19:55:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x1008, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:40 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf04b7bb07f0000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 280.944538][T25772] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:40 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x800, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) lseek(0xffffffffffffffff, 0x10000, 0x2) [ 281.005907][T25794] SELinux: duplicate or incompatible mount options 19:55:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x1010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open_tree(r0, &(0x7f0000000080)='./file0\x00', 0x1001) sendfile(0xffffffffffffffff, r1, &(0x7f00000000c0)=0xffffffff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 281.052250][T25802] SELinux: duplicate or incompatible mount options 19:55:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x1100, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:41 executing program 2 (fault-call:0 fault-nth:0): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:41 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x100000000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 281.097974][T25772] loop1: detected capacity change from 0 to 152833 [ 281.123166][T25814] SELinux: duplicate or incompatible mount options [ 281.145595][T25772] loop1: p1[EZD] p3 [ 281.150300][T25772] loop1: p1 start 117440512 is beyond EOD, truncated [ 281.156988][T25772] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:41 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a00000aff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646566636f6e746578743d73797374656d5f7505000000000000003d73797361646d5f752c00e86bfbe1d47f9564f19aaded427ae0126e96677b352c4142f24cba0c6a57a690c0fe5df7b9a57e9f7fb91d235bfa1b9ff05f9ce97dd658230e91a1b11d0d2b90ba9d6d9debda8245ae0c0d9d9feef50506f17dd6000000"]) 19:55:41 executing program 5: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet6(0xa, 0x100000003, 0x3e) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000006, 0x2010, r0, 0xbefc0000) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x8, @loopback, 0x2}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000100)=""/196, 0xc4, 0x8002, &(0x7f0000000040)={0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, '\x00', 0x10}}, 0x1c) 19:55:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x2002, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 281.218860][T25836] FAULT_INJECTION: forcing a failure. [ 281.218860][T25836] name failslab, interval 1, probability 0, space 0, times 0 [ 281.231560][T25836] CPU: 1 PID: 25836 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 281.240322][T25836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.250384][T25836] Call Trace: [ 281.253665][T25836] dump_stack+0x137/0x19d [ 281.258000][T25836] should_fail+0x23c/0x250 [ 281.262510][T25836] ? __se_sys_memfd_create+0xfb/0x390 19:55:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="64651f5c29b4746578743d73797374eeff000000000000746578743d73797361646d07002c004d7e36884bdb7f7d3ad6f15897e10e6458196db15ab8f1dc0d54"]) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x88, r1, 0x401, 0x70bd2a, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x9cd4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}]}, 0x88}, 0x1, 0x0, 0x0, 0x40400c0}, 0x4001) 19:55:41 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1100000000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 281.267899][T25836] __should_failslab+0x81/0x90 [ 281.272677][T25836] should_failslab+0x5/0x20 [ 281.277193][T25836] __kmalloc+0x66/0x340 [ 281.281361][T25836] ? strnlen_user+0x137/0x1c0 [ 281.286188][T25836] __se_sys_memfd_create+0xfb/0x390 [ 281.291385][T25836] __x64_sys_memfd_create+0x2d/0x40 [ 281.296623][T25836] do_syscall_64+0x4a/0x90 [ 281.301046][T25836] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 281.307116][T25836] RIP: 0033:0x4665d9 [ 281.311010][T25836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 281.330678][T25836] RSP: 002b:00007f5b51553e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 281.339119][T25836] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 00000000004665d9 [ 281.347166][T25836] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 281.355139][T25836] RBP: 000000000000002c R08: ff00400200000000 R09: 0000000000000000 19:55:41 executing program 0: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646566774b2cb7ce98c95e0041207bffffffff66d45a636f6e7465010400000000000060646d5f752c00000000d694b06a5470ab5500000000"]) 19:55:41 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1f00000000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 281.363114][T25836] R10: 000000000000002c R11: 0000000000000246 R12: 0000000008100000 [ 281.371084][T25836] R13: 00007ffc149dd0cf R14: 0000000008100000 R15: 0000000000022000 19:55:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x2800, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:41 executing program 2 (fault-call:0 fault-nth:1): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 281.408940][T25538] blk_update_request: I/O error, dev loop1, sector 152673 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 281.420719][ T1794] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 281.439256][T25866] FAULT_INJECTION: forcing a failure. [ 281.439256][T25866] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 281.452367][T25866] CPU: 1 PID: 25866 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 281.461120][ T702] blk_update_request: I/O error, dev loop1, sector 152673 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 281.461134][T25866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.461147][T25866] Call Trace: [ 281.461154][T25866] dump_stack+0x137/0x19d [ 281.472442][ T702] Buffer I/O error on dev loop1p3, logical block 19056, async page read [ 281.482444][T25866] should_fail+0x23c/0x250 [ 281.482469][T25866] should_fail_usercopy+0x16/0x20 [ 281.508075][T25866] _copy_from_user+0x1c/0xd0 [ 281.512656][T25866] __se_sys_memfd_create+0x137/0x390 [ 281.517926][T25866] __x64_sys_memfd_create+0x2d/0x40 [ 281.523235][T25866] do_syscall_64+0x4a/0x90 [ 281.527651][T25866] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 281.533528][T25866] RIP: 0033:0x4665d9 [ 281.537473][T25866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 281.557263][T25866] RSP: 002b:00007f5b51553e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 19:55:41 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4100000000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='de\t\x00\x00\x00\x00\x00\x00\x00=system_u,conpext=sysadm_u,\x00']) [ 281.565666][T25866] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 00000000004665d9 [ 281.573615][T25866] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 281.581565][T25866] RBP: 000000000000002c R08: ff00400200000000 R09: 0000000000000000 [ 281.589572][T25866] R10: 000000000000002c R11: 0000000000000246 R12: 0000000008100000 [ 281.597524][T25866] R13: 00007ffc149dd0cf R14: 0000000008100000 R15: 0000000000022000 [ 281.652815][T25877] loop1: detected capacity change from 0 to 152833 [ 281.699281][T25877] loop1: p1[EZD] p3 [ 281.703554][T25877] loop1: p1 start 167772160 is beyond EOD, truncated [ 281.710318][T25877] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 281.769638][T25877] loop1: detected capacity change from 0 to 152833 [ 281.817662][T25877] loop1: p1[EZD] p3 [ 281.821638][T25877] loop1: p1 start 167772160 is beyond EOD, truncated [ 281.828404][T25877] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:41 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a00000bff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x3000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 281.937635][T25909] loop1: detected capacity change from 0 to 152833 [ 281.977860][T25909] loop1: p1[EZD] p3 [ 281.982057][T25909] loop1: p1 start 184549376 is beyond EOD, truncated [ 281.988771][T25909] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:42 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, &(0x7f0000000100)="6edf30d737647500fb5212ae5ae134a3013b2bc83e12c6d8a8679cd26c2ec258e194be66c132850d258c25a6371cea83d8d27a3eca4548764d912d441127967dd97c7c6e941c825d629473279e296735f478ad1433b30761811e77d483cea72acf7522c53045e99fd451c0ad747f74cd3a427f446dabe5b845247cbc2b176a84567e63f0e4fd67520aeede6ace728a989ccdb18d021586b57d16f5ebd84a71129571cc921fca50f4c664144606324eec36ae534ddf7657078ab02cd0bb7e76ef25d4f503d0a6b75d2945e10634be86d51d95848441554dbfedfe0d0b3dfba67619aa77eff819b92bee8d5ae6993c", 0xee, 0x4040014, &(0x7f0000000000)={0xa, 0x4e20, 0x4, @empty, 0x1}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x10) 19:55:42 executing program 2 (fault-call:0 fault-nth:2): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:42 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf5ffffff00000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:42 executing program 0: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) io_pgetevents(0x0, 0x3, 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f00000001c0)={r0, r1+60000000}, &(0x7f0000000240)={&(0x7f0000000200)={[0x6c9]}, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6778743d7364730000006e746578743d73797361646d5f752c2034566241164d00000000000000003c29715f78cd338df0140000000000e520fd1978ba0da0c64cc9553478f6974f2dc493f75ecc18ce78553a4c5d0aab66"]) 19:55:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x3f00, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:42 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000018ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) flock(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 282.130126][T25928] loop1: detected capacity change from 0 to 152833 [ 282.135736][T25933] FAULT_INJECTION: forcing a failure. [ 282.135736][T25933] name failslab, interval 1, probability 0, space 0, times 0 [ 282.149292][T25933] CPU: 0 PID: 25933 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 282.158054][T25933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.168114][T25933] Call Trace: [ 282.171396][T25933] dump_stack+0x137/0x19d [ 282.175727][T25933] should_fail+0x23c/0x250 19:55:42 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xff8f000000000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 282.180152][T25933] ? shmem_alloc_inode+0x22/0x30 [ 282.184681][T25941] SELinux: duplicate or incompatible mount options [ 282.185164][T25933] __should_failslab+0x81/0x90 [ 282.185191][T25933] ? shmem_match+0xa0/0xa0 [ 282.200911][T25933] should_failslab+0x5/0x20 [ 282.205418][T25933] kmem_cache_alloc+0x46/0x2f0 [ 282.210251][T25933] ? do_anonymous_page+0x411/0x8b0 [ 282.215474][T25933] ? fsnotify_perm+0x59/0x2e0 [ 282.216091][T25943] SELinux: duplicate or incompatible mount options 19:55:42 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 282.220153][T25933] ? shmem_match+0xa0/0xa0 [ 282.220205][T25933] shmem_alloc_inode+0x22/0x30 [ 282.220225][T25933] new_inode_pseudo+0x38/0x1c0 [ 282.220241][T25933] new_inode+0x21/0x120 [ 282.220255][T25933] shmem_get_inode+0xa1/0x480 [ 282.249602][T25933] __shmem_file_setup+0xf1/0x1d0 [ 282.254557][T25933] shmem_file_setup+0x37/0x40 [ 282.259241][T25933] __se_sys_memfd_create+0x1eb/0x390 [ 282.264543][T25933] __x64_sys_memfd_create+0x2d/0x40 [ 282.269771][T25933] do_syscall_64+0x4a/0x90 [ 282.274804][T25933] entry_SYSCALL_64_after_hwframe+0x44/0xae 19:55:42 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xffffffff00000000, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 282.280709][T25933] RIP: 0033:0x4665d9 [ 282.284605][T25933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 282.292187][T25951] SELinux: duplicate or incompatible mount options [ 282.304323][T25933] RSP: 002b:00007f5b51553e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 282.319339][T25933] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 00000000004665d9 19:55:42 executing program 5: socket$packet(0x11, 0x2, 0x300) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x141140, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 282.327310][T25933] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 282.335284][T25933] RBP: 000000000000002c R08: ff00400200000000 R09: 0000000000000000 [ 282.341510][T25955] SELinux: duplicate or incompatible mount options [ 282.343247][T25933] R10: 000000000000002c R11: 0000000000000246 R12: 0000000008100000 [ 282.343264][T25933] R13: 00007ffc149dd0cf R14: 0000000008100000 R15: 0000000000022000 19:55:42 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x10}, 0x58) 19:55:42 executing program 2 (fault-call:0 fault-nth:3): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 282.396289][T25928] loop1: p1[EZD] p3 19:55:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x183) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000240)="46159aa0b5c8c996a72904cac1db8dafd0dc87a7424a99b43788f81b45", 0x1d}], 0x0, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0ee867081b28309b334a", 0x12e9}], 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r4 = signalfd4(r0, &(0x7f0000000080)={[0x200]}, 0x8, 0x800) r5 = syz_open_dev$tty1(0xc, 0x4, 0x4) mmap(&(0x7f00005a1000/0x4000)=nil, 0x4000, 0x1000008, 0x10, r5, 0x151c000) openat(r4, &(0x7f00000000c0)='./file0\x00', 0x214840, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r6 = accept$inet(r2, 0x0, &(0x7f0000000140)) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000001c0)=0xc) setreuid(0x0, r7) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='dax,nodiscard,nombcache,lazytime,errors=remount-ro,commit=0x0000000000000004,sysvgroups,errors=remount-ro,defcontext=system_u,fowner=', @ANYRESDEC=r7, @ANYBLOB="2d60fa2f8e0a3414e5c300"]) 19:55:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x4000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 282.418209][T25928] loop1: p1 start 402653184 is beyond EOD, truncated [ 282.424919][T25928] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:42 executing program 5: r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[], 0xfffffe53) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r1, 0x409, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, 0x10, r1, 0xe83b6000) fcntl$addseals(r0, 0x409, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r2 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r2, 0x4, 0x42000) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x81, 0x7, 0x7fff, 0x1ff, 0x7, 0x6, 0x8}, 0x1c) r3 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) [ 282.472007][T25976] FAULT_INJECTION: forcing a failure. [ 282.472007][T25976] name failslab, interval 1, probability 0, space 0, times 0 [ 282.484666][T25976] CPU: 0 PID: 25976 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 282.484728][T25976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.484739][T25976] Call Trace: 19:55:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x5800, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 282.484746][T25976] dump_stack+0x137/0x19d [ 282.484770][T25976] should_fail+0x23c/0x250 [ 282.484788][T25976] ? security_inode_alloc+0x30/0x180 [ 282.484813][T25976] __should_failslab+0x81/0x90 [ 282.484837][T25976] should_failslab+0x5/0x20 [ 282.484854][T25976] kmem_cache_alloc+0x46/0x2f0 [ 282.484921][T25976] security_inode_alloc+0x30/0x180 [ 282.485023][T25976] inode_init_always+0x20b/0x420 [ 282.485039][T25976] ? shmem_match+0xa0/0xa0 [ 282.485075][T25976] new_inode_pseudo+0x73/0x1c0 [ 282.485121][T25976] new_inode+0x21/0x120 [ 282.485140][T25976] shmem_get_inode+0xa1/0x480 [ 282.485158][T25976] __shmem_file_setup+0xf1/0x1d0 [ 282.485175][T25976] shmem_file_setup+0x37/0x40 19:55:42 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a00001cff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:42 executing program 2 (fault-call:0 fault-nth:4): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:42 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x4000}, 0x58) 19:55:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x6000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 282.485194][T25976] __se_sys_memfd_create+0x1eb/0x390 [ 282.485241][T25976] __x64_sys_memfd_create+0x2d/0x40 [ 282.485329][T25976] do_syscall_64+0x4a/0x90 [ 282.485346][T25976] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 282.485364][T25976] RIP: 0033:0x4665d9 [ 282.485376][T25976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 282.485396][T25976] RSP: 002b:00007f5b51553e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 282.485416][T25976] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 00000000004665d9 [ 282.485429][T25976] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 282.485446][T25976] RBP: 000000000000002c R08: ff00400200000000 R09: 0000000000000000 [ 282.485459][T25976] R10: 000000000000002c R11: 0000000000000246 R12: 0000000008100000 [ 282.485472][T25976] R13: 00007ffc149dd0cf R14: 0000000008100000 R15: 0000000000022000 [ 282.546105][T25928] loop1: detected capacity change from 0 to 152833 [ 282.587595][T25928] loop1: p1[EZD] p3 [ 282.587649][T25928] loop1: p1 start 402653184 is beyond EOD, truncated [ 282.587662][T25928] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 282.709231][T26008] FAULT_INJECTION: forcing a failure. [ 282.709231][T26008] name failslab, interval 1, probability 0, space 0, times 0 [ 282.777957][T26008] CPU: 1 PID: 26008 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 282.777979][T26008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.796776][T26008] Call Trace: [ 282.796786][T26008] dump_stack+0x137/0x19d [ 282.796811][T26008] should_fail+0x23c/0x250 [ 282.808792][T26008] ? __d_alloc+0x36/0x370 19:55:42 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0xffffc90000000000}, 0x58) 19:55:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x7800, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 282.808816][T26008] __should_failslab+0x81/0x90 19:55:42 executing program 2 (fault-call:0 fault-nth:5): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 282.808886][T26008] should_failslab+0x5/0x20 [ 282.808901][T26008] kmem_cache_alloc+0x46/0x2f0 [ 282.808923][T26008] ? __init_rwsem+0x59/0x70 [ 282.808940][T26008] __d_alloc+0x36/0x370 [ 282.808957][T26008] ? current_time+0xdb/0x190 [ 282.808974][T26008] d_alloc_pseudo+0x1a/0x50 [ 282.808990][T26008] alloc_file_pseudo+0x63/0x130 [ 282.809009][T26008] __shmem_file_setup+0x14c/0x1d0 [ 282.809072][T26008] shmem_file_setup+0x37/0x40 [ 282.809093][T26008] __se_sys_memfd_create+0x1eb/0x390 [ 282.809112][T26008] __x64_sys_memfd_create+0x2d/0x40 [ 282.809142][T26008] do_syscall_64+0x4a/0x90 [ 282.809166][T26008] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 282.809192][T26008] RIP: 0033:0x4665d9 [ 282.809206][T26008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 282.809226][T26008] RSP: 002b:00007f5b51553e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 19:55:42 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x20000358) [ 282.809242][T26008] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 00000000004665d9 [ 282.809256][T26008] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 282.809270][T26008] RBP: 000000000000002c R08: ff00400200000000 R09: 0000000000000000 [ 282.809284][T26008] R10: 000000000000002c R11: 0000000000000246 R12: 0000000008100000 [ 282.809311][T26008] R13: 00007ffc149dd0cf R14: 0000000008100000 R15: 0000000000022000 [ 282.824717][T26009] loop1: detected capacity change from 0 to 152833 [ 282.857159][T26009] loop1: p1[EZD] p3 [ 282.857216][T26009] loop1: p1 start 469762048 is beyond EOD, truncated [ 282.857232][T26009] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 282.880857][T26029] FAULT_INJECTION: forcing a failure. [ 282.880857][T26029] name failslab, interval 1, probability 0, space 0, times 0 [ 283.048356][T26029] CPU: 1 PID: 26029 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 283.048385][T26029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.048396][T26029] Call Trace: [ 283.048404][T26029] dump_stack+0x137/0x19d [ 283.048428][T26029] should_fail+0x23c/0x250 [ 283.048522][T26029] ? __alloc_file+0x2e/0x1a0 [ 283.048538][T26029] __should_failslab+0x81/0x90 [ 283.048558][T26029] should_failslab+0x5/0x20 [ 283.048605][T26029] kmem_cache_alloc+0x46/0x2f0 [ 283.048676][T26029] ? inode_doinit_with_dentry+0x382/0x950 [ 283.048695][T26029] __alloc_file+0x2e/0x1a0 [ 283.048709][T26029] alloc_empty_file+0xcd/0x1c0 [ 283.048727][T26029] alloc_file+0x3a/0x280 [ 283.048750][T26029] alloc_file_pseudo+0xe2/0x130 [ 283.048782][T26029] __shmem_file_setup+0x14c/0x1d0 [ 283.048822][T26029] shmem_file_setup+0x37/0x40 [ 283.048841][T26029] __se_sys_memfd_create+0x1eb/0x390 [ 283.048889][T26029] __x64_sys_memfd_create+0x2d/0x40 [ 283.048906][T26029] do_syscall_64+0x4a/0x90 [ 283.048923][T26029] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 283.048948][T26029] RIP: 0033:0x4665d9 [ 283.048963][T26029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 283.049061][T26029] RSP: 002b:00007f5b51553e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 283.184785][T26029] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 00000000004665d9 [ 283.184805][T26029] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 283.184816][T26029] RBP: 000000000000002c R08: ff00400200000000 R09: 0000000000000000 [ 283.184829][T26029] R10: 000000000000002c R11: 0000000000000246 R12: 0000000008100000 [ 283.216762][T26029] R13: 00007ffc149dd0cf R14: 0000000008100000 R15: 0000000000022000 [ 283.234201][T26009] loop1: detected capacity change from 0 to 152833 [ 283.277125][T26009] loop1: p1[EZD] p3 [ 283.277216][T26009] loop1: p1 start 469762048 is beyond EOD, truncated [ 283.277233][T26009] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x1201040, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:43 executing program 2 (fault-call:0 fault-nth:6): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:43 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x80fe, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:43 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000020ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:43 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000e40)={0x28, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r3 = dup(r2) sendmsg$NL80211_CMD_AUTHENTICATE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10250500f784080003010000000000000000", @ANYRES32, @ANYBLOB="090007000495b225ef000000"], 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x20004010) sendmsg$NL80211_CMD_SET_MAC_ACL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4004600}, 0xc, &(0x7f0000000080)={&(0x7f00000005c0)={0x1ac, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7f, 0x62}}}}, [@NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x70, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @device_b}, {0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}]}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x40, 0xa6, 0x0, 0x1, [{0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}]}, @NL80211_ATTR_MAC_ADDRS={0x1c, 0xa6, 0x0, 0x1, [{0xa}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x4c, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_MAC_ADDRS={0x4c, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x20000010}, 0x2400c010) sendmsg$NL80211_CMD_SET_MAC_ACL(r2, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x46, 0x1c}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x40040}, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x800) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x84e00}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x20, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x8841) r5 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r5, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r5, 0x409, 0x0) io_submit(0x0, 0x1, &(0x7f0000000100)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0xfffe, r5, &(0x7f0000000000)="0a2381ba1b2528e7d2817a3b41463cc871885051e5f215594069319b85e7dde7f7429d6a81c83c623ce058caf6a0d40601c9b7bf691290d63ea76d6e8e43f6bf55df5079ea0d78e2f3a45902a12eda2e1b9821bb8e36af07133dab4c50caab8e58d62989a1ff86d6", 0x68, 0x22b, 0x0, 0x3}]) r6 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r6, 0x4, 0x42000) r7 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 283.455995][T26069] FAULT_INJECTION: forcing a failure. [ 283.455995][T26069] name failslab, interval 1, probability 0, space 0, times 0 [ 283.468682][T26069] CPU: 1 PID: 26069 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 283.477441][T26069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.487494][T26069] Call Trace: [ 283.490768][T26069] dump_stack+0x137/0x19d [ 283.495105][T26069] should_fail+0x23c/0x250 [ 283.499553][T26069] ? security_file_alloc+0x30/0x190 [ 283.504947][T26069] __should_failslab+0x81/0x90 [ 283.505838][T26071] loop1: detected capacity change from 0 to 152833 [ 283.509789][T26069] should_failslab+0x5/0x20 [ 283.509809][T26069] kmem_cache_alloc+0x46/0x2f0 [ 283.525602][T26069] security_file_alloc+0x30/0x190 [ 283.530633][T26069] __alloc_file+0x83/0x1a0 [ 283.535053][T26069] alloc_empty_file+0xcd/0x1c0 [ 283.539816][T26069] alloc_file+0x3a/0x280 [ 283.541361][T26070] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 283.544047][T26069] alloc_file_pseudo+0xe2/0x130 [ 283.558327][T26069] __shmem_file_setup+0x14c/0x1d0 [ 283.563447][T26069] shmem_file_setup+0x37/0x40 [ 283.568134][T26069] __se_sys_memfd_create+0x1eb/0x390 [ 283.573498][T26069] __x64_sys_memfd_create+0x2d/0x40 [ 283.578697][T26069] do_syscall_64+0x4a/0x90 [ 283.583167][T26069] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 283.589070][T26069] RIP: 0033:0x4665d9 [ 283.593022][T26069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 283.612637][T26069] RSP: 002b:00007f5b51553e98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 283.621044][T26069] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 00000000004665d9 [ 283.629014][T26069] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 283.637031][T26069] RBP: 000000000000002c R08: ff00400200000000 R09: 0000000000000000 [ 283.644993][T26069] R10: 000000000000002c R11: 0000000000000246 R12: 0000000008100000 19:55:43 executing program 3: unshare(0x2a000400) unshare(0x8000000) set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x401) fork() r0 = getpid() tkill(r0, 0x1000000000015) prlimit64(r0, 0x4, &(0x7f0000000040)={0x1ff, 0xfffffffffffff893}, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x1000000000015) clone3(&(0x7f0000000100)={0x802f2a1b672001ed, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, &(0x7f0000000000)=[r1], 0x1}, 0x58) [ 283.652961][T26069] R13: 00007ffc149dd0cf R14: 0000000008100000 R15: 0000000000022000 19:55:43 executing program 2 (fault-call:0 fault-nth:7): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0xa005, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 283.679973][T26071] loop1: p1[EZD] p3 [ 283.693030][T26071] loop1: p1 start 536870912 is beyond EOD, truncated [ 283.699930][T26071] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 283.737481][T26094] FAULT_INJECTION: forcing a failure. [ 283.737481][T26094] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 283.750994][T26094] CPU: 0 PID: 26094 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 283.759753][T26094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.769803][T26094] Call Trace: [ 283.773074][T26094] dump_stack+0x137/0x19d [ 283.777448][T26094] should_fail+0x23c/0x250 [ 283.781862][T26094] __alloc_pages+0x102/0x320 19:55:43 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000026ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 283.786455][T26094] alloc_pages_vma+0x391/0x660 [ 283.791359][T26094] shmem_getpage_gfp+0x980/0x1410 [ 283.796381][T26094] ? mls_context_isvalid+0x76/0x1e0 [ 283.801585][T26094] shmem_write_begin+0x7e/0x100 [ 283.806481][T26094] generic_perform_write+0x196/0x3a0 [ 283.811867][T26094] ? file_update_time+0x1bd/0x3e0 [ 283.817012][T26094] __generic_file_write_iter+0x161/0x300 [ 283.822706][T26094] ? generic_write_checks+0x250/0x290 [ 283.828073][T26094] generic_file_write_iter+0x75/0x130 [ 283.833446][T26094] vfs_write+0x69d/0x770 [ 283.837697][T26094] __x64_sys_pwrite64+0xf5/0x150 [ 283.842661][T26094] do_syscall_64+0x4a/0x90 [ 283.847058][T26094] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 283.853005][T26094] RIP: 0033:0x419777 [ 283.856877][T26094] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 283.876549][T26094] RSP: 002b:00007f5b51553e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 19:55:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0xc805, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 283.884938][T26094] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 283.892907][T26094] RDX: 0000000000000040 RSI: 0000000020000680 RDI: 0000000000000004 [ 283.900855][T26094] RBP: 000000000000002c R08: 0000000000000000 R09: 0000000000000000 [ 283.908852][T26094] R10: 00000000000001c0 R11: 0000000000000293 R12: 0000000000000004 [ 283.916811][T26094] R13: 0000000000000004 R14: 0000000020000280 R15: 0000000000000000 [ 283.926912][T26083] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 19:55:43 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000531ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0xe803, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x5, &(0x7f00000000c0)={0xa, 0x4e23, 0x2ab7, @dev={0xfe, 0x80, '\x00', 0x26}, 0x3}, 0x1c) 19:55:44 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a00003fff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0xf401, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:44 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000040ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 284.243519][T26094] loop2: detected capacity change from 0 to 264192 [ 284.266313][T26142] loop1: detected capacity change from 0 to 152833 [ 284.331475][T26142] loop1: p1[EZD] p3 [ 284.337365][T26142] loop1: p1 start 1073741824 is beyond EOD, truncated [ 284.344156][T26142] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:46 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0xa, 0x7, 0x1, 0x7}, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/hid', 0x200080, 0x86) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0xc, &(0x7f00000001c0)=0x5, 0x4) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f0000000140)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_hsr\x00', &(0x7f0000000280)=@ethtool_perm_addr={0x20, 0x57, "fc4341580375354b58b4f9744d67f1d0c45a2bc82ddb316f2c51eaf5257ff6bad08c09be4764dd73dca86b6315dd84343b65cdeb28e463fb9f616a050bb2dc66f86aad40885bc023d146d7fdaf7d5d3ab9e4a976e0ed64"}}) fcntl$setstatus(r0, 0x4, 0x42000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) r3 = socket$inet6(0xa, 0x2, 0x3a) sendto$inet6(r2, 0x0, 0x3, 0x24000815, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e24, 0x1, @remote, 0x8}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x1, 0x2, 0x0, 0x10000, 0x20, 0x6, 0x6}, 0x1c) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000100)=0x400) 19:55:46 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) 19:55:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0xfc00, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:46 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000480ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:46 executing program 2 (fault-call:0 fault-nth:8): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/55, 0x37}, {&(0x7f0000000180)=""/233, 0xe9}, {&(0x7f00000000c0)=""/95, 0x5f}, {&(0x7f0000000280)=""/126, 0x7e}, {&(0x7f0000000300)=""/102, 0x66}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/94, 0x5e}, {&(0x7f0000000440)=""/149, 0x95}], 0x8, 0xd9f, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(r1, 0x0, 0x20040010) sendmsg$NL80211_CMD_SET_PMK(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x900}, 0xc, &(0x7f00000002c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010037d0b42d3b0200002aabde1f68c3098d08000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000370000001400020110c12fe359c901ec47384564eca4d73d"], 0x3c}}, 0x20000004) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e22, 0x8b, @empty, 0xae8}, 0x1c) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080024bd7000fddbdf252100000008000300", @ANYRES32=r4, @ANYBLOB="080077d7fbfff1ff"], 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0xc4) sendmsg$NL80211_CMD_SET_KEY(r3, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000780)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="9106abb7d37932411e2c71fae7c310b389a7ff74e98674fbe3933dbe9d8c7e5201bf28c1627047ba5373eca8d452a9b071edc8cac398620c00c0681c5eb000a4b01a509972462c23ac61183f3bedb9374fe2ead320fa03adeb7517ae7a8e8107b88001df6f8c19008d375dca9159332d1868bcaf00"/137, @ANYRES32=r4, @ANYBLOB="9613000a00243c062bd5b4aabcf6198b9f6e66090020005080050009000100000005000000000000000a000400a7c5d43f7aa100070000bc0000000000173bb549fc7c000000000000b35e01b23950179ff2473953f65bbab64b8eff35a06f85482734c3d48974bf29b1005a77f898189b2a3897b6a2f7376cb4dc347c766851b9c029e880b219582ad1ff01190a052063b2cb7178694c106ef98280903a3ad475153452e544aa44d6dbde4732bd12ebff44870e792346486ec20f20f3fa1bb76c7f4fed6881382cf499cddb8e086293f26977d1e11e68c22162241b1fee31f85d25d4310802dcc97aa9f443c914"], 0x70}, 0x1, 0x0, 0x0, 0x4004005}, 0x4000030) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400ea00", @ANYRES16=0x0, @ANYBLOB="04d1b7745a3523f7a11c002700000000ff02b7", @ANYRES32=r4, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x14) sendmsg$NL80211_CMD_AUTHENTICATE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10250500f784080003010000000000000000", @ANYRES32=r4, @ANYBLOB="090007000495b225ef000000"], 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x20004010) sendmsg$NL80211_CMD_SET_MAC_ACL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4004600}, 0xc, &(0x7f0000000080)={&(0x7f00000005c0)={0x1ac, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x7f, 0x62}}}}, [@NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x70, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @device_b}, {0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}]}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x40, 0xa6, 0x0, 0x1, [{0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}]}, @NL80211_ATTR_MAC_ADDRS={0x1c, 0xa6, 0x0, 0x1, [{0xa}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x4c, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_MAC_ADDRS={0x4c, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x20000010}, 0x2400c010) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646566636f6e746578740673797374656d5f752c636f6e746578743d73797361646d5f752c00"]) [ 286.655281][T26171] loop1: detected capacity change from 0 to 152833 [ 286.655542][T26173] FAULT_INJECTION: forcing a failure. [ 286.655542][T26173] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 286.674980][T26173] CPU: 1 PID: 26173 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 286.683735][T26173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.693818][T26173] Call Trace: [ 286.697095][T26173] dump_stack+0x137/0x19d [ 286.701533][T26173] should_fail+0x23c/0x250 [ 286.705943][T26173] should_fail_usercopy+0x16/0x20 [ 286.710973][T26173] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 286.717150][T26173] ? shmem_write_begin+0x7e/0x100 [ 286.722259][T26173] generic_perform_write+0x1e4/0x3a0 [ 286.727550][T26173] ? file_update_time+0x1bd/0x3e0 [ 286.732606][T26173] __generic_file_write_iter+0x161/0x300 [ 286.738244][T26173] ? generic_write_checks+0x250/0x290 [ 286.743622][T26173] generic_file_write_iter+0x75/0x130 [ 286.748986][T26173] vfs_write+0x69d/0x770 19:55:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0xfe80, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 286.753215][T26173] __x64_sys_pwrite64+0xf5/0x150 [ 286.758150][T26173] do_syscall_64+0x4a/0x90 [ 286.762607][T26173] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 286.768506][T26173] RIP: 0033:0x419777 [ 286.772389][T26173] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 286.791993][T26173] RSP: 002b:00007f5b51553e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 19:55:46 executing program 3: unshare(0x38010d80) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) unshare(0x10000000) 19:55:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x90000, 0x0) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x4) flock(r1, 0xa) r3 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r3, 0x409, 0x0) preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000180)=""/181, 0xb5}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f0000000280)=""/142, 0x8e}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000340)=""/78, 0x4e}, {&(0x7f00000003c0)=""/3, 0x3}, {&(0x7f0000000400)=""/80, 0x50}], 0x7, 0x81, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 286.800398][T26173] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 286.808406][T26173] RDX: 0000000000000040 RSI: 0000000020000680 RDI: 0000000000000004 [ 286.816378][T26173] RBP: 000000000000002c R08: 0000000000000000 R09: 0000000000000000 [ 286.824575][T26173] R10: 00000000000001c0 R11: 0000000000000293 R12: 0000000000000004 [ 286.832539][T26173] R13: 0000000000000004 R14: 0000000020000280 R15: 0000000000000000 [ 286.849919][T26171] loop1: p1[EZD] p3 19:55:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0xff00, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 286.871685][T26171] loop1: p1 start 2147745792 is beyond EOD, truncated [ 286.878520][T26171] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) unlinkat(r0, &(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10, 0x12, r0, 0xa3b6a000) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x1dd31ec012d5034b, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000180)="43a64a1e15c9449fca62d4ccd4622d54ce8863b71983441fe88f0f504a619bd18a2923a0d1444512183fac9780bdd2fdbc7652a56d3605512125c76d606b3c924ba07704a2e6ba5bda952a520f1e0bd21d06fa9a0bc8f7ae8ebb007fc96170f61d6789ad994015598880926c63d622607243155c216bef4c404128cb1573be4d2967b177bc541e3d3848beda32be96e7328992ea2c589e2f45c1", 0x9a}], 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x0, &(0x7f0000000140)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:55:46 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a00fdefff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 286.927744][T26203] SELinux: duplicate or incompatible mount options [ 286.956730][T26203] SELinux: duplicate or incompatible mount options [ 287.023802][T26216] SELinux: duplicate or incompatible mount options [ 287.033653][T26217] loop1: detected capacity change from 0 to 152833 [ 287.048055][T26219] SELinux: duplicate or incompatible mount options [ 287.086987][T26217] loop1: p1[EZD] p3 [ 287.091073][T26217] loop1: p1 start 4026335232 is beyond EOD, truncated [ 287.097964][T26217] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:47 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000000640)=[{{&(0x7f0000000000)=@caif=@dgm, 0x80, &(0x7f0000000540)=[{&(0x7f0000000100)=""/127, 0x7f}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000180)=""/229, 0xe5}, {&(0x7f0000000280)=""/156, 0x9c}, {&(0x7f0000000340)=""/199, 0xc7}, {&(0x7f0000000440)=""/206, 0xce}], 0x6, &(0x7f00000005c0)=""/85, 0x55}, 0x1}], 0x1, 0x40008000, &(0x7f0000000680)={0x0, 0x3938700}) r0 = socket$packet(0x11, 0x3, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendfile(r1, r0, 0x0, 0x1a) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x0, 0x2, 0x0, "c1710f31f5e9d0d5d2e11ef423ee4f71f944cb132bf1f9f0312dd381f9b98c0dce3f9a9e9aedf09f8697840da18649fc312864c19ab18394de8ef8beaadf374517bfdc5208a849238657320cb118414b"}, 0xd8) sendto$inet6(r1, 0x0, 0x0, 0xb9685b6b2a6f8c9a, &(0x7f00000000c0)={0xa, 0xfffd, 0x2, @loopback={0x0, 0xac141409}, 0xfffffffd}, 0x1c) 19:55:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x20480, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:47 executing program 0 (fault-call:7 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 287.135275][T26173] loop2: detected capacity change from 0 to 264192 [ 287.168035][T26173] loop2: p1 p3 [ 287.171982][T26173] loop2: p1 size 11290111 extends beyond EOD, truncated [ 287.188592][T26173] loop2: p3 size 1912633224 extends beyond EOD, truncated 19:55:47 executing program 2 (fault-call:0 fault-nth:9): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:47 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="00610a6c959ff720ae00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x8058, &(0x7f0000000100)='/%@\xad-]&)*)\\\x00') r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r1, 0x409, 0x0) fcntl$lock(r1, 0x5, &(0x7f00000000c0)={0x1, 0x3, 0x2, 0x2, r0}) 19:55:47 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a00effdff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x34000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 287.304710][T26251] FAULT_INJECTION: forcing a failure. [ 287.304710][T26251] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 287.317965][T26251] CPU: 0 PID: 26251 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 287.326766][T26251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.336821][T26251] Call Trace: [ 287.340097][T26251] dump_stack+0x137/0x19d [ 287.344475][T26251] should_fail+0x23c/0x250 [ 287.348882][T26251] __alloc_pages+0x102/0x320 [ 287.353560][T26251] alloc_pages_vma+0x391/0x660 [ 287.358310][T26251] ? page_address_in_vma+0x264/0x300 [ 287.363629][T26251] new_page+0x124/0x170 [ 287.367841][T26251] migrate_pages+0x3b3/0x1540 [ 287.372512][T26251] ? do_mbind+0xfc0/0xfc0 [ 287.376826][T26251] ? walk_page_range+0x29f/0x2e0 [ 287.381762][T26251] do_mbind+0xdc9/0xfc0 [ 287.385922][T26251] __x64_sys_mbind+0x142/0x170 [ 287.390677][T26251] do_syscall_64+0x4a/0x90 [ 287.395098][T26251] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 287.401051][T26251] RIP: 0033:0x4665d9 [ 287.404940][T26251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 287.424551][T26251] RSP: 002b:00007f13c7def188 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 287.432970][T26251] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 287.440939][T26251] RDX: 0000000000000000 RSI: 0000000000c00034 RDI: 0000000020012000 19:55:47 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x8010, r0, 0x32296000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x40000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 287.448997][T26251] RBP: 00007f13c7def1d0 R08: 0000000000000000 R09: 0000010000000003 [ 287.457030][T26251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 287.464993][T26251] R13: 00007ffda012f82f R14: 00007f13c7def300 R15: 0000000000022000 [ 287.495192][T26261] loop1: detected capacity change from 0 to 152833 [ 287.512609][T26272] FAULT_INJECTION: forcing a failure. [ 287.512609][T26272] name failslab, interval 1, probability 0, space 0, times 0 [ 287.525278][T26272] CPU: 1 PID: 26272 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 287.534040][T26272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.544097][T26272] Call Trace: [ 287.547374][T26272] dump_stack+0x137/0x19d [ 287.551720][T26272] should_fail+0x23c/0x250 [ 287.556149][T26272] ? getname_flags+0x84/0x3d0 19:55:47 executing program 3: unshare(0x2a000400) unshare(0x100) set_mempolicy(0x3, &(0x7f0000000000)=0x6, 0x5) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:47 executing program 0 (fault-call:7 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 287.560836][T26272] __should_failslab+0x81/0x90 [ 287.565648][T26272] should_failslab+0x5/0x20 [ 287.570154][T26272] kmem_cache_alloc+0x46/0x2f0 [ 287.574922][T26272] getname_flags+0x84/0x3d0 [ 287.579415][T26272] ? vfs_write+0x703/0x770 [ 287.583915][T26272] getname+0x15/0x20 [ 287.587851][T26272] do_sys_openat2+0x5b/0x250 [ 287.592449][T26272] ? __fget_light+0x21b/0x260 [ 287.597252][T26272] __x64_sys_openat+0xef/0x110 [ 287.602029][T26272] do_syscall_64+0x4a/0x90 [ 287.606453][T26272] entry_SYSCALL_64_after_hwframe+0x44/0xae 19:55:47 executing program 3: unshare(0x2a000400) unshare(0x40040000) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 287.612483][T26272] RIP: 0033:0x4196c4 [ 287.616377][T26272] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 287.636075][T26272] RSP: 002b:00007f5b51553e20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 287.644563][T26272] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 287.652537][T26272] RDX: 0000000000000002 RSI: 00007f5b51553f40 RDI: 00000000ffffff9c 19:55:47 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1, 0x6, 0x0, 0x76}, {0x6, 0x7, 0x0, 0x401}, {0x8001, 0x20, 0x4, 0x7f}, {0x6, 0x5, 0x1, 0x200}]}, 0x10) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x7ff, 0x424045) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@local, 0x0, 0x0, 0x3, 0xc, 0xb2, 0x4}, 0x20) [ 287.660513][T26272] RBP: 00007f5b51553f40 R08: 0000000000000000 R09: 0000000000000000 [ 287.668487][T26272] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 287.676454][T26272] R13: 0000000000000004 R14: 00000000200006a0 R15: 000000000000002c [ 287.697311][T26261] loop1: p1[EZD] p3 [ 287.701791][T26261] loop1: p1 start 4260298752 is beyond EOD, truncated 19:55:47 executing program 2 (fault-call:0 fault-nth:10): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 287.708594][T26261] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x100000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:47 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a00fffeff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 287.820635][T26320] FAULT_INJECTION: forcing a failure. [ 287.820635][T26320] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 287.833896][T26320] CPU: 1 PID: 26320 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 287.842666][T26320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.852720][T26320] Call Trace: [ 287.856085][T26320] dump_stack+0x137/0x19d [ 287.860423][T26320] should_fail+0x23c/0x250 [ 287.864899][T26320] should_fail_usercopy+0x16/0x20 19:55:47 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42800) r1 = socket$inet6(0xa, 0x100000003, 0x3e) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000000)="cd", 0x1) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:47 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000040)={0x980, {{0x2, 0x4e22, @private=0xa010100}}, 0x0, 0x1, [{{0x2, 0x4e22, @local}}]}, 0x110) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x1, 0x102) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) fork() [ 287.869914][T26320] strncpy_from_user+0x21/0x250 [ 287.874762][T26320] getname_flags+0xb8/0x3d0 [ 287.879339][T26320] ? vfs_write+0x703/0x770 [ 287.883780][T26320] getname+0x15/0x20 [ 287.887668][T26320] do_sys_openat2+0x5b/0x250 [ 287.892314][T26320] ? __fget_light+0x21b/0x260 [ 287.897080][T26320] __x64_sys_openat+0xef/0x110 [ 287.901887][T26320] do_syscall_64+0x4a/0x90 [ 287.906309][T26320] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 287.912213][T26320] RIP: 0033:0x4196c4 [ 287.916220][T26320] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 287.935932][T26320] RSP: 002b:00007f5b51553e20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 287.944345][T26320] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 287.952311][T26320] RDX: 0000000000000002 RSI: 00007f5b51553f40 RDI: 00000000ffffff9c [ 287.956663][T26324] loop1: detected capacity change from 0 to 152833 19:55:47 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {0x15}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 287.960281][T26320] RBP: 00007f5b51553f40 R08: 0000000000000000 R09: 0000000000000000 [ 287.974737][T26320] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 287.982780][T26320] R13: 0000000000000004 R14: 00000000200006a0 R15: 000000000000002c [ 287.994193][T26314] FAULT_INJECTION: forcing a failure. [ 287.994193][T26314] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 288.007447][T26314] CPU: 1 PID: 26314 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 19:55:48 executing program 2 (fault-call:0 fault-nth:11): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 288.016398][T26314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.026619][T26314] Call Trace: [ 288.029944][T26314] dump_stack+0x137/0x19d [ 288.034299][T26314] should_fail+0x23c/0x250 [ 288.038721][T26314] __alloc_pages+0x102/0x320 [ 288.043440][T26314] alloc_pages_vma+0x391/0x660 [ 288.048207][T26314] ? page_address_in_vma+0x264/0x300 [ 288.053500][T26314] new_page+0x124/0x170 [ 288.057667][T26314] migrate_pages+0x3b3/0x1540 [ 288.062355][T26314] ? do_mbind+0xfc0/0xfc0 [ 288.066702][T26314] ? remove_migration_ptes+0x90/0x90 [ 288.071994][T26314] do_mbind+0xdc9/0xfc0 [ 288.076213][T26314] __x64_sys_mbind+0x142/0x170 [ 288.081108][T26314] do_syscall_64+0x4a/0x90 [ 288.085691][T26314] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.091591][T26314] RIP: 0033:0x4665d9 [ 288.092044][T26348] FAULT_INJECTION: forcing a failure. [ 288.092044][T26348] name failslab, interval 1, probability 0, space 0, times 0 [ 288.095479][T26314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 288.127653][T26314] RSP: 002b:00007f13c7e10188 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 288.136076][T26314] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 288.144080][T26314] RDX: 0000000000000000 RSI: 0000000000c00034 RDI: 0000000020012000 [ 288.152039][T26314] RBP: 00007f13c7e101d0 R08: 0000000000000000 R09: 0000010000000003 [ 288.160092][T26314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.168048][T26314] R13: 00007ffda012f82f R14: 00007f13c7e10300 R15: 0000000000022000 [ 288.176044][T26348] CPU: 0 PID: 26348 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 288.184803][T26348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.194845][T26348] Call Trace: [ 288.198121][T26348] dump_stack+0x137/0x19d [ 288.202445][T26348] should_fail+0x23c/0x250 [ 288.206863][T26348] ? __alloc_file+0x2e/0x1a0 [ 288.211463][T26348] __should_failslab+0x81/0x90 [ 288.216228][T26348] should_failslab+0x5/0x20 19:55:48 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000040)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x2c}}, 0x0) [ 288.220727][T26348] kmem_cache_alloc+0x46/0x2f0 [ 288.225573][T26348] __alloc_file+0x2e/0x1a0 [ 288.230019][T26348] alloc_empty_file+0xcd/0x1c0 [ 288.234796][T26348] path_openat+0x6a/0x20b0 [ 288.239220][T26348] ? avc_has_perm_noaudit+0x19a/0x240 [ 288.244833][T26348] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 288.250297][T26348] ? avc_has_perm+0x59/0x150 [ 288.254952][T26348] ? avc_has_perm+0xc8/0x150 [ 288.259547][T26348] do_filp_open+0xd9/0x1f0 [ 288.263966][T26348] ? __virt_addr_valid+0x15a/0x1a0 [ 288.269072][T26348] ? __check_object_size+0x253/0x310 [ 288.275213][T26348] ? _find_next_bit+0x16a/0x190 [ 288.280093][T26348] ? alloc_fd+0x388/0x3e0 [ 288.285385][T26348] do_sys_openat2+0xa3/0x250 [ 288.290500][T26348] ? __fget_light+0x21b/0x260 [ 288.295177][T26348] __x64_sys_openat+0xef/0x110 [ 288.299927][T26348] do_syscall_64+0x4a/0x90 [ 288.304400][T26348] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.310339][T26348] RIP: 0033:0x4196c4 [ 288.314214][T26348] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 288.333861][T26348] RSP: 002b:00007f5b51553e20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 288.342390][T26348] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 288.350344][T26348] RDX: 0000000000000002 RSI: 00007f5b51553f40 RDI: 00000000ffffff9c [ 288.358386][T26348] RBP: 00007f5b51553f40 R08: 0000000000000000 R09: 0000000000000000 sendmmsg$inet6(r0, &(0x7f0000002180)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x23, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000080)="04b39506b37dd63b0501fff1f75282eab0fe77ac9b723418d14258567a5c639b560b2b6970bb1747bb0552662147ce9e0df91b2c683446d9573b5c820890abed23ed371400dc043f853186f69deae67577f46993587d71c20072493fd6411aa118754326dc3e865372635d8492bd900ec2bb3854fbb0a4a0358999bb82a8685124d87a02f659da8d7af17c3fdf920fd512b87dad428654e99d41d2ec585bb1fa8d89dbcfec4aae6d0def0ec6e9b60f947cb1eaef20a3860f49dcd6d75d", 0xbd}], 0x1}}, {{&(0x7f0000000180)={0xa, 0x4e22, 0x3ff, @private2={0xfc, 0x2, '\x00', 0x1}, 0xe8e}, 0x1c, &(0x7f0000000280)=[{&(0x7f00000001c0)="d63bd2fdb6900caccc593ca9fd9b6ce207033a13f277330fa4ed704f15e2cb64dc15d652c9dd09f7bf9b98fdd9dfa5b88ba163d39176869ebec4c00f983e9579744dda18e6ff3fd8cae7291d6973a0f462d435a305e99419604d59723a6b08e957899cf1d6199b34d98b1156462ef7f75c75c5d675fd04c6b5363fd7f12ca11325a8b41ffcad9ff091aee583594f249d8b1dced7fde2b26c354eb635be3d8500a2be84d2", 0xa4}, {&(0x7f0000000380)="b5ca6c2847a6dc40003f1c87b00cecc620d0a90fa2f699760256c25b479823ee706692315509a64b1b962ae0fb65492385c24da75fa3f31321ea78d02e10777b53e27f32535241052f2d53a80703af64a42a819b4e98b937dea3816edde0ec0f1121df97c9ff8f01140d7dab4dd6e451bf488ae930edb2077884540f5bfa861a83375bac4e2d427ac7185ca583726d90545e43dc80d6cc0b625f8de077f1fe6d668ee001475ebd7ce3312415238c29b0bccebb08d9d9", 0xb6}], 0x2, &(0x7f0000000440)=[@hoplimit={{0x14, 0x29, 0x34, 0x401}}, @hopopts={{0x30, 0x29, 0x36, {0x87, 0x2, '\x00', [@calipso={0x7, 0x10, {0x3, 0x2, 0x7, 0x5, [0x1a]}}, @pad1]}}}], 0x48}}, {{&(0x7f00000004c0)={0xa, 0x4e23, 0x0, @local, 0x10000}, 0x1c, &(0x7f00000007c0)=[{&(0x7f0000000500)="7ba9b6863e92142a6e7187b4d77d8cdc92fabeebed06d53d0ef026ef31d852ca64ee7630878d102b4c5257a0ac8ddc0feef6c056b3c509e6efe3b0d1089724486491da51bc39ec9c96e920d23a1c3302d6dc22cdcbdeb417b0dc7c3ab5fcbb932a08a8559e61de3dde95a6c07be0a88f4997212fb16434d5ad53f3ccf024b08a8f9ee94c989885515eaf5651d2e6fd46842a6f4330ff8095645f0d320956c3c6df2478f32464268796847af71039dc2491a61116b31b986c1c2cb632e3414f61531e0321cbb498d67d150a640574460a534bb57437c0fc03bb7e1cb7bc4a5837d27d46b4fc6728069b1e22", 0xeb}, {&(0x7f0000000600)="1c82789d0ec50defdaeaf7ce88c4c075c0ed8a9eecb43b4fd10a91595d076ed280b14d4fde598b27272e8abbcafaef428576341c96afc107a109169a027d3560cf4926d9b34da58591d6e183922e91d92ef03496abdf536165fa789dc8332a58bcc1d38160b14e9fec58d2e49f559077a234a59461f45c2f956ae11d05c3e1923dbcd2468f58628b27fe0d87a448b61457abe50cf269c7d553a53c3f8449d6966fcc21ba7ee4b2e1bc0a14ac57b5f4c6f91e30fcfa9d54a77ad477e39261854b5cf2f433cc80f6d3", 0xc8}, {&(0x7f0000000700)="1720c890ca71bbc81315eff79f2aaa8dfcc47f317243636fd0ca51f8af05581e08ff3b52b77bbe8fa85a106fbddb7f3b162b6be5ffc51f4f2e23c9276af87c64defaa3e63ed47ee1057e86b60c5c4079d7cfd0227df2a31eaeb40f4165008ed84d6136e1961ec72baf9427227f3eb8dbf2633387c238eee5964f20ced0e324932932ecf3ff4ccbf319562ca0f1be9a9e96aac95905ef7f02d1ebfb728428d72d62a22813e743376b8a089e4463c95ac95a", 0xb1}], 0x3, &(0x7f0000000800)=[@flowinfo={{0x14, 0x29, 0xb, 0xbe1}}, @rthdr={{0x38, 0x29, 0x39, {0x2f, 0x4, 0x1, 0xdb, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @empty}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @hopopts={{0x60, 0x29, 0x36, {0x3c, 0x8, '\x00', [@jumbo={0xc2, 0x4, 0x40}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x27}}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @loopback}, @pad1, @enc_lim={0x4, 0x1, 0x8}, @enc_lim={0x4, 0x1, 0x6}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x8}}, @hopopts={{0x38, 0x29, 0x36, {0x4, 0x3, '\x00', [@pad1, @ra={0x5, 0x2, 0x3}, @jumbo, @pad1, @pad1, @jumbo={0xc2, 0x4, 0x5}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x9368}}, @hoplimit={{0x14, 0x29, 0x34, 0x2}}, @dontfrag={{0x14, 0x29, 0x3e, 0xfff}}, @dontfrag={{0x14, 0x29, 0x3e, 0x9}}], 0x178}}, {{&(0x7f0000000980)={0xa, 0x4e24, 0x5, @mcast1}, 0x1c, &(0x7f0000001d80)=[{&(0x7f00000009c0)="31a14f78796d2f09b31172de46c222d080c3da3b7ea4e3b167aa28a0", 0x1c}, {&(0x7f0000000a00)="24cce71e83f936f7a91f7de0fa0a6c2b4b4b88f6d77f43b639a4b40f81c56902de631b7adcb668275b6a3f19f37a1eef86264a448fb9308a6a11fa9398918749e494c66b915416945488ba58928851c51341569d3b833e5e8641966b7c837b5d961d9d774998f8e393ba2a038359db4c85b50793cb34e051203be59dbcb356beac59da09f75137938a0e09745c6e645c4726f61273a148b5b700d99bfdb2cd8af5ebf609d31e2e049f8eb000e43fc744520a9ba7d1b11682cb9f4b13ae1e8c813ccf45a68816105e2b4d991b6e2ffce39c40328ac4ca2371aace801e9abad810", 0xe0}, {&(0x7f0000000b00)="f517a2a620a766d44f7d2b7839e314d1cbfa057632ae3b2654d6", 0x1a}, {&(0x7f0000000b40)="73c930c9325a86a31e041f26e62f1a6df19389c29ebe1062628e1f43ff4a398ff572b680723c5e3d591fe3888e63cbe788956f78bb568d38f77de731bd1229d3ffc78b4bd2670691c14ca7195bc4401c70061405246d4679c7dc4bf346781ea0e6e11239c2cfac704a7a40e337709cd18a370f5c12e72ea2acedbf1a83862ac748f73a2f6af9968279332329d5", 0x8d}, {&(0x7f0000000c00)="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", 0x1000}, {&(0x7f0000001c00)="b0bfffb4242db18f222eb0bdefaab719777933f0972a9de655e909bf03e2274d986f2f22ca144bdc276c3620b7a90b6ae786f755a44b15274feaf58dd893d90e7e08448a5eaef16dcfd2f32731c9a80b3a479f47a9b49a4dac037d5107425f0fb3b0170ac0a974b3370039e1865bafd4efcf5709795dc5acbac267a694434b2d673a12825dc0827d6bd0c80ffbc11c183b3b68aa1a2a86f761072c8822c6e5a015c485974a73f7c465f983e2a1ce15a1110724e551ece53da6113b99c071d54e030ae308783d2ca955f3cf8557a486b9554dfcc82dbe5cc83b3639f68338ce80667e548a4969c0a216083cfeb7dded54", 0xf0}, {&(0x7f0000001d00)="24da286b24c9375a398f0fa1eb12795e6ad27b3bf0bf871e478c45c58106882c422080a6ba22f6d903bf874e89ac1b6206aac2bea75cd857368b6970d261c8fe721529a3fa060e20903e025de711103e2e24d116e9ba26254f977eafe53e0100aeff2617f8a35d9f9488ceea5a5b8ae21577c21079cae4f5", 0x78}], 0x7, &(0x7f0000001e00)=[@hoplimit={{0x14, 0x29, 0x34, 0x7}}, @tclass={{0x14, 0x29, 0x43, 0x20}}, @flowinfo={{0x14, 0x29, 0xb, 0x7ff}}, @dstopts={{0x20, 0x29, 0x37, {0x62, 0x0, '\x00', [@jumbo]}}}], 0x68}}, {{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e80)="ee29b210fb9af9ed8b5158865ae2656406cd3030e61817c8da054d7799b0d81c493b81329cca56e8f707e83384dea23e1cc9f13df3b38b1067aad141ac1e544f2473", 0x42}, {&(0x7f0000001f00)="fc23f736d639b446286631c2c717c6e1aeb01f310ee4976a46a38f947fa8205a2289c58b75f8cb82770ae9e2a6b6f54d41de6824a1c9d1498125945e2304de5976d58618f677691d9f184b3bfc68eb79c96fa467dc814346e9c727b5d82bdcfc0e2e994569cccccd7ded66572d4802948ccbe2db87cf8d9fcca3a962812a7fd30a757e6f5fa43db524dcb1b53a27531a8f3e3fe762d38e7a793f15a86563d4a3f9d9ccfd7c97054927e3f80d0a9338d59e52b9346a6b3d2aff92db7ff3689d31880f5190dd8e470c9612b9afbdfca5372c64a1f8c699f7cd0497ff", 0xdb}, {&(0x7f0000002000)="ad81ed5a76d78db56582595a4dd0803cbb14232506bce7d63f3cfe3c67ebd68c58e487f6d63dcee4e4c40aded6cd8f446036d6bd3f0f7111a15e6153ec2824ce434f047496bf46d2692eb5ba9b54f9782c02fcf19e679d7c1cb0d364f02788b8f28f0db2b3b728acacdac1be523eb417d363b01b5c3f6d4374324b5e74147733a1e2fc013d25cd5bd5cd8f5287c9cbe167dbb4eb1bee5e9e44f1a7a5588a2165a23c239c6dceed012ef87247df99220848c75f4f3aff76e8d07fd6a5836bd8300057d9168dc9937d3695253cfebc043eba", 0xd1}], 0x3, &(0x7f0000002140)=[@tclass={{0x14, 0x29, 0x43, 0x100}}, @pktinfo={{0x24, 0x29, 0x32, {@private1, r4}}}], 0x40}}], 0x5, 0x10000) r5 = syz_open_procfs(0x0, &(0x7f00000022c0)='statm\x00') getdents(r5, &(0x7f0000002300)=""/188, 0xbc) unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r6 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r6], 0x1}, 0x58) r7 = getpid() tkill(r7, 0x1000000000015) ioprio_get$pid(0x1, r7) 19:55:48 executing program 0 (fault-call:7 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:48 executing program 5: socket$packet(0x11, 0x2, 0x300) openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x10001, 0x180) r0 = syz_open_dev$rtc(&(0x7f0000000040), 0xfffffffffffff000, 0x860401) fcntl$setstatus(r0, 0x4, 0x40000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:48 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x400300, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 288.366443][T26348] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 288.374544][T26348] R13: 0000000000000004 R14: 00000000200006a0 R15: 000000000000002c [ 288.404490][T26324] loop1: p1[EZD] p3 [ 288.408544][T26352] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 288.414946][T26324] loop1: p1 start 4278124544 is beyond EOD, truncated [ 288.423438][T26324] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:48 executing program 2 (fault-call:0 fault-nth:12): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:48 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x6, 0x9, 0x6, 0xaf4}, 0x10) 19:55:48 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0xf0ff7f, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 288.491493][T26324] loop1: detected capacity change from 0 to 152833 19:55:48 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a00feffff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 288.554826][T26380] FAULT_INJECTION: forcing a failure. [ 288.554826][T26380] name failslab, interval 1, probability 0, space 0, times 0 [ 288.567481][T26380] CPU: 0 PID: 26380 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 288.576249][T26380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.586299][T26380] Call Trace: [ 288.589575][T26380] dump_stack+0x137/0x19d [ 288.593968][T26380] should_fail+0x23c/0x250 [ 288.598393][T26380] ? security_file_alloc+0x30/0x190 [ 288.603587][T26380] __should_failslab+0x81/0x90 [ 288.608356][T26380] should_failslab+0x5/0x20 [ 288.612905][T26380] kmem_cache_alloc+0x46/0x2f0 [ 288.617681][T26380] security_file_alloc+0x30/0x190 [ 288.622703][T26380] __alloc_file+0x83/0x1a0 [ 288.627102][T26380] alloc_empty_file+0xcd/0x1c0 [ 288.631949][T26380] path_openat+0x6a/0x20b0 [ 288.636398][T26380] ? avc_has_perm_noaudit+0x19a/0x240 [ 288.641800][T26380] ? avc_has_perm+0x59/0x150 [ 288.646374][T26380] ? avc_has_perm+0xc8/0x150 [ 288.651142][T26380] do_filp_open+0xd9/0x1f0 [ 288.655551][T26380] ? __virt_addr_valid+0x15a/0x1a0 [ 288.660672][T26380] ? __check_object_size+0x253/0x310 [ 288.665973][T26380] ? _find_next_bit+0x16a/0x190 [ 288.670822][T26380] ? alloc_fd+0x388/0x3e0 [ 288.675142][T26380] do_sys_openat2+0xa3/0x250 [ 288.679722][T26380] ? __fget_light+0x21b/0x260 [ 288.684482][T26380] __x64_sys_openat+0xef/0x110 [ 288.689301][T26380] do_syscall_64+0x4a/0x90 [ 288.693844][T26380] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.699995][T26380] RIP: 0033:0x4196c4 [ 288.703913][T26380] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 288.723515][T26380] RSP: 002b:00007f5b51553e20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 288.732022][T26380] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 288.740139][T26380] RDX: 0000000000000002 RSI: 00007f5b51553f40 RDI: 00000000ffffff9c 19:55:48 executing program 2 (fault-call:0 fault-nth:13): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 288.748105][T26380] RBP: 00007f5b51553f40 R08: 0000000000000000 R09: 0000000000000000 [ 288.756169][T26380] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 288.764131][T26380] R13: 0000000000000004 R14: 00000000200006a0 R15: 000000000000002c [ 288.778454][T26368] FAULT_INJECTION: forcing a failure. [ 288.778454][T26368] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 288.791681][T26368] CPU: 1 PID: 26368 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 288.800483][T26368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.810576][T26368] Call Trace: [ 288.813853][T26368] dump_stack+0x137/0x19d [ 288.818179][T26368] should_fail+0x23c/0x250 [ 288.822197][T26386] FAULT_INJECTION: forcing a failure. [ 288.822197][T26386] name failslab, interval 1, probability 0, space 0, times 0 [ 288.822636][T26368] __alloc_pages+0x102/0x320 [ 288.822657][T26368] alloc_pages_vma+0x391/0x660 [ 288.822673][T26368] ? page_address_in_vma+0x264/0x300 [ 288.849791][T26368] new_page+0x124/0x170 [ 288.853993][T26368] migrate_pages+0x3b3/0x1540 [ 288.858693][T26368] ? do_mbind+0xfc0/0xfc0 [ 288.863005][T26368] ? remove_migration_ptes+0x90/0x90 [ 288.868464][T26368] do_mbind+0xdc9/0xfc0 [ 288.872646][T26368] __x64_sys_mbind+0x142/0x170 [ 288.877490][T26368] do_syscall_64+0x4a/0x90 [ 288.881890][T26368] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.887768][T26368] RIP: 0033:0x4665d9 [ 288.891643][T26368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 288.911232][T26368] RSP: 002b:00007f13c7e10188 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 288.919625][T26368] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 288.928043][T26368] RDX: 0000000000000000 RSI: 0000000000c00034 RDI: 0000000020012000 [ 288.935997][T26368] RBP: 00007f13c7e101d0 R08: 0000000000000000 R09: 0000010000000003 [ 288.943948][T26368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.951964][T26368] R13: 00007ffda012f82f R14: 00007f13c7e10300 R15: 0000000000022000 [ 288.960066][T26386] CPU: 0 PID: 26386 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 288.968827][T26386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.978877][T26386] Call Trace: [ 288.982153][T26386] dump_stack+0x137/0x19d [ 288.986682][T26386] should_fail+0x23c/0x250 [ 288.991102][T26386] ? loop_set_status_from_info+0x3a0/0x3a0 [ 288.997135][T26386] __should_failslab+0x81/0x90 [ 289.001921][T26386] ? __kthread_create_on_node+0x7a/0x290 [ 289.007668][T26386] should_failslab+0x5/0x20 [ 289.012165][T26386] kmem_cache_alloc_trace+0x49/0x310 [ 289.017435][T26386] ? loop_set_status_from_info+0x3a0/0x3a0 [ 289.023258][T26386] __kthread_create_on_node+0x7a/0x290 [ 289.028719][T26386] ? lo_open+0x93/0xa0 [ 289.032906][T26386] ? __blkdev_get+0xc1/0x6d0 [ 289.037492][T26386] ? loop_set_status_from_info+0x3a0/0x3a0 [ 289.043335][T26386] kthread_create_on_node+0x72/0xa0 [ 289.048640][T26386] loop_configure+0x597/0xcb0 [ 289.053406][T26386] ? mntput+0x45/0x70 [ 289.057387][T26386] lo_ioctl+0x555/0x11f0 [ 289.061614][T26386] ? path_openat+0x19ab/0x20b0 [ 289.066435][T26386] ? putname+0xa5/0xc0 [ 289.070483][T26386] ? ___cache_free+0x3c/0x300 [ 289.075139][T26386] ? blkdev_common_ioctl+0x9c3/0x1040 [ 289.080504][T26386] ? selinux_file_ioctl+0x8e0/0x970 [ 289.085682][T26386] ? lo_release+0x120/0x120 [ 289.090223][T26386] blkdev_ioctl+0x1d0/0x3c0 [ 289.094872][T26386] block_ioctl+0x6d/0x80 [ 289.099116][T26386] ? blkdev_iopoll+0x70/0x70 [ 289.103726][T26386] __se_sys_ioctl+0xcb/0x140 [ 289.108371][T26386] __x64_sys_ioctl+0x3f/0x50 [ 289.113048][T26386] do_syscall_64+0x4a/0x90 [ 289.117461][T26386] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 289.123415][T26386] RIP: 0033:0x466397 [ 289.127295][T26386] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 289.146892][T26386] RSP: 002b:00007f5b51553e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 19:55:49 executing program 0 (fault-call:7 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x1000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 289.155284][T26386] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 289.163279][T26386] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 289.171292][T26386] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 289.179248][T26386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 289.187249][T26386] R13: 0000000000000004 R14: 00000000200006a0 R15: 000000000000002c 19:55:49 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x0, 0x800, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x4}}}}, [@NL80211_ATTR_CQM={0x24, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x80000001}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x6}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x7}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x145}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40080}, 0x2000010) r1 = socket$inet6(0xa, 0x6, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa20081}, 0xc, &(0x7f0000000080)={&(0x7f0000000840)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012abd7000ffdbdf253000000008000300", @ANYRES32=0x0, @ANYRESDEC=r2], 0x24}, 0x1, 0x0, 0x0, 0x20000090}, 0x20048000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/power/wakeup_count', 0x0, 0x0) preadv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1, 0x0, 0x0) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f0000000800)={0x56, 0xd, &(0x7f0000000400)}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000e40)={0x28, r4, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r4, 0x200, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0xd538, 0x69}}}}, [@NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x6}, @NL80211_ATTR_STA_WME={0x14, 0x81, [@NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x6}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 289.259955][T26390] loop1: detected capacity change from 0 to 152833 [ 289.308563][T26390] loop1: p1[EZD] p3 [ 289.313004][T26390] loop1: p1 start 4294836224 is beyond EOD, truncated [ 289.319831][T26390] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 289.422812][T26409] FAULT_INJECTION: forcing a failure. [ 289.422812][T26409] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 289.426443][T26408] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 289.436107][T26409] CPU: 1 PID: 26409 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 289.454432][T26409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.464580][T26409] Call Trace: [ 289.467845][T26409] dump_stack+0x137/0x19d [ 289.472210][T26409] should_fail+0x23c/0x250 [ 289.476689][T26409] __alloc_pages+0x102/0x320 [ 289.481255][T26409] alloc_pages_vma+0x391/0x660 [ 289.486155][T26409] ? page_address_in_vma+0x264/0x300 [ 289.491466][T26409] new_page+0x124/0x170 [ 289.495602][T26409] migrate_pages+0x3b3/0x1540 [ 289.500322][T26409] ? do_mbind+0xfc0/0xfc0 [ 289.504644][T26409] ? remove_migration_ptes+0x90/0x90 [ 289.509970][T26409] do_mbind+0xdc9/0xfc0 [ 289.514233][T26409] __x64_sys_mbind+0x142/0x170 [ 289.518981][T26409] do_syscall_64+0x4a/0x90 [ 289.523378][T26409] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 289.529261][T26409] RIP: 0033:0x4665d9 [ 289.533137][T26409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 289.552744][T26409] RSP: 002b:00007f13c7e10188 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 289.561169][T26409] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 289.569141][T26409] RDX: 0000000000000000 RSI: 0000000000c00034 RDI: 0000000020012000 [ 289.577134][T26409] RBP: 00007f13c7e101d0 R08: 0000000000000000 R09: 0000010000000003 [ 289.585392][T26409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 289.593452][T26409] R13: 00007ffda012f82f R14: 00007f13c7e10300 R15: 0000000000022000 [ 289.688469][T26408] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 19:55:51 executing program 3: unshare(0x2a000400) set_mempolicy(0x1, &(0x7f0000000040)=0x400000000000005, 0x4000009) fork() getpid() unshare(0x800) r0 = getpid() tkill(r0, 0x1000000000015) clone3(&(0x7f0000000080)={0x41004000, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x3d}, 0x58) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0xfffffffffffffff7) 19:55:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x1030000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:51 executing program 2 (fault-call:0 fault-nth:14): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:51 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000002ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:51 executing program 0 (fault-call:7 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:51 executing program 5: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet6(0xa, 0x100000003, 0x3e) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x401, 0x5, 0x2, 0x6, 0x3ff, 0x9}, 0x1c) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000004, 0x810, r2, 0x9a460000) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 291.295320][T26425] FAULT_INJECTION: forcing a failure. [ 291.295320][T26425] name failslab, interval 1, probability 0, space 0, times 0 [ 291.308974][T26425] CPU: 0 PID: 26425 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 291.317749][T26425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.327846][T26425] Call Trace: [ 291.331120][T26425] dump_stack+0x137/0x19d [ 291.335460][T26425] should_fail+0x23c/0x250 [ 291.339867][T26425] ? __kernfs_new_node+0x6a/0x330 [ 291.344892][T26425] __should_failslab+0x81/0x90 [ 291.349739][T26425] should_failslab+0x5/0x20 [ 291.354236][T26425] kmem_cache_alloc+0x46/0x2f0 [ 291.359015][T26425] ? kvm_sched_clock_read+0xd/0x20 [ 291.364130][T26425] __kernfs_new_node+0x6a/0x330 [ 291.368980][T26425] ? select_task_rq_fair+0x186/0xc00 [ 291.374268][T26425] ? rb_insert_color+0x7e/0x310 [ 291.376070][T26429] loop1: detected capacity change from 0 to 152833 [ 291.379114][T26425] kernfs_create_dir_ns+0x5e/0x140 [ 291.379142][T26425] internal_create_group+0x138/0x850 [ 291.396033][T26425] ? check_preempt_wakeup+0x1bb/0x360 [ 291.401416][T26425] sysfs_create_group+0x1b/0x20 [ 291.406302][T26425] loop_configure+0xa21/0xcb0 [ 291.410979][T26425] lo_ioctl+0x555/0x11f0 [ 291.415273][T26425] ? path_openat+0x19ab/0x20b0 [ 291.420071][T26425] ? putname+0xa5/0xc0 [ 291.424135][T26425] ? ___cache_free+0x3c/0x300 [ 291.428920][T26425] ? blkdev_common_ioctl+0x9c3/0x1040 [ 291.434289][T26425] ? selinux_file_ioctl+0x8e0/0x970 [ 291.439492][T26425] ? lo_release+0x120/0x120 [ 291.443997][T26425] blkdev_ioctl+0x1d0/0x3c0 [ 291.448640][T26425] block_ioctl+0x6d/0x80 [ 291.452890][T26425] ? blkdev_iopoll+0x70/0x70 [ 291.457484][T26425] __se_sys_ioctl+0xcb/0x140 [ 291.462171][T26425] __x64_sys_ioctl+0x3f/0x50 [ 291.466760][T26425] do_syscall_64+0x4a/0x90 [ 291.471176][T26425] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 291.477084][T26425] RIP: 0033:0x466397 [ 291.480969][T26425] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 291.500672][T26425] RSP: 002b:00007f5b51553e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.509112][T26425] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 291.517066][T26425] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 291.525188][T26425] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 291.533393][T26425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 291.541353][T26425] R13: 0000000000000004 R14: 00000000200006a0 R15: 000000000000002c [ 291.549366][T26425] loop2: detected capacity change from 0 to 264192 [ 291.563493][T26428] FAULT_INJECTION: forcing a failure. [ 291.563493][T26428] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 291.576737][T26428] CPU: 1 PID: 26428 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 291.585501][T26428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.595605][T26428] Call Trace: [ 291.598875][T26428] dump_stack+0x137/0x19d [ 291.603223][T26428] should_fail+0x23c/0x250 [ 291.607660][T26428] __alloc_pages+0x102/0x320 [ 291.612242][T26428] alloc_pages_vma+0x391/0x660 [ 291.617087][T26428] ? page_address_in_vma+0x264/0x300 [ 291.622379][T26428] new_page+0x124/0x170 [ 291.626543][T26428] migrate_pages+0x3b3/0x1540 [ 291.631258][T26428] ? do_mbind+0xfc0/0xfc0 [ 291.635582][T26428] ? remove_migration_ptes+0x90/0x90 [ 291.641380][T26428] do_mbind+0xdc9/0xfc0 [ 291.645628][T26428] __x64_sys_mbind+0x142/0x170 [ 291.650390][T26428] do_syscall_64+0x4a/0x90 [ 291.654804][T26428] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 291.660736][T26428] RIP: 0033:0x4665d9 [ 291.664625][T26428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 291.684526][T26428] RSP: 002b:00007f13c7e10188 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 19:55:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x2000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 291.692924][T26428] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 291.700948][T26428] RDX: 0000000000000000 RSI: 0000000000c00034 RDI: 0000000020012000 [ 291.708912][T26428] RBP: 00007f13c7e101d0 R08: 0000000000000000 R09: 0000010000000003 [ 291.716942][T26428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.724901][T26428] R13: 00007ffda012f82f R14: 00007f13c7e10300 R15: 0000000000022000 19:55:51 executing program 0 (fault-call:7 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 291.766448][T26425] loop2: p1 p3 [ 291.769986][T26425] loop2: p1 size 11290111 extends beyond EOD, truncated [ 291.786719][T26429] loop1: p1[EZD] p3 [ 291.791645][T26429] loop1: p1 start 33554432 is beyond EOD, truncated [ 291.798309][T26429] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 291.805875][T26425] loop2: p3 size 1912633224 extends beyond EOD, truncated 19:55:51 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000003ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x3000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:51 executing program 2 (fault-call:0 fault-nth:15): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:51 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r2, 0x409, 0x0) pwritev(r0, &(0x7f0000000940)=[{&(0x7f0000000540)="70577f689a63", 0x6}, {&(0x7f0000000580)="38d51d9a1fa689919ea25fbf721b031b7f47d34353240a34213a9779d23d7b710b5c24a1e802209b5241d7acf16ff160d23c6671da2617bfc5445302faf39bfe4e3730446fa300956c3315bfe3f857642f003d95a4ac5eeff5408b26ad00c062fbcbbc96ea65eb0b352c6b351298af954c7364f283f30e148d607c57eaa44371abf2756083ed0ca7374661a96ad41e6292ca9855c0463c1ac9affebd0a85a99e8066cda6ed64ca92a19712f0d9e43e5dbf79782cd2fb35db5cf85fa94f293a1a382383d8cc0d", 0xc6}, {&(0x7f0000000680)="cdbbc7b7915ade5f408a14cf2e43e4207bc60f554fa044af93910321abb8ccdaf33b49c471a5ec8f7832e7141973c12084a983ead0d2a6f3ce68af0027011133c39c9cf4fce871a8", 0x48}, {&(0x7f0000000700)}, {&(0x7f0000000740)="af22574541eed4bcc0683f496292d9cf070eaf730d8137650ea6ac085b11308e4824f67a27caa8d33072136fc1454f29a6b6e90b7fdc2d55c381917006e8ca822d1225e09a3f7ef08d7ab7221ea344a67a79b2f8e95953fa0b5e01e933d261e774a411dee05541d9d0e13b28a5ac5451158aa53373ce89e572737bdbfe8c703f4f1338bc1b88c23bb76ad5100fa4a0a369fa0aceb394", 0x96}, {&(0x7f0000000800)="5d884467cfe123cf38f0e769daaaa9b8ab029d9ff3ca5aa9d8075ca8140adbe4da1cac07af971dde95079edb8bff2e42b7e65afc8478722d5f8f624744cb1570935bdfda7bb42ed62f508ffb605348ed8e343f33a44cafab2d3ac0b089cf7d712286cc55e8c138452334d34b2aa2b19d8fcc4c44dbdf84066d3a95d48fe57512b16b07660bca5c0a31005e3736e06718e4b2d1f21b97e381ec0de6279ef67f697b6d160e7a4cc081251f836e82c6f38d989e2c90ad725c20cf72e452b543996fd44efb7542ae78c7b4112bca26d4c5056782a2d136f2fd3ab67bbed04f46a1ab0c48ad02cbc4131659dea82d676a8834aaa3bf4aa2", 0xf5}, {&(0x7f0000000900)}], 0x7, 0x0, 0xfb10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000480)={0x2, 'gre0\x00', {0x357e}, 0x1}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000004c0)={'veth0_to_bridge\x00', {0x2, 0x0, @private}}) preadv(r2, &(0x7f0000000400)=[{&(0x7f0000000100)=""/199, 0xc7}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000040)=""/108, 0x6c}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000240)=""/173, 0xad}, {&(0x7f0000000300)=""/146, 0x92}, {&(0x7f00000003c0)=""/56, 0x38}], 0x7, 0x4, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 291.944508][T26465] loop1: detected capacity change from 0 to 152833 [ 291.989925][T26465] loop1: p1[EZD] p3 [ 291.996060][T26476] FAULT_INJECTION: forcing a failure. [ 291.996060][T26476] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 292.009296][T26476] CPU: 1 PID: 26476 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 292.018254][T26476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.023404][T26465] loop1: p1 start 50331648 is beyond EOD, [ 292.028327][T26476] Call Trace: [ 292.028336][T26476] dump_stack+0x137/0x19d [ 292.028360][T26476] should_fail+0x23c/0x250 [ 292.034146][T26465] truncated [ 292.034152][T26465] loop1: p3 size 1912633224 extends beyond EOD, [ 292.037413][T26476] __alloc_pages+0x102/0x320 [ 292.037433][T26476] alloc_pages_vma+0x391/0x660 [ 292.041751][T26465] truncated [ 292.067936][T26476] ? page_address_in_vma+0x264/0x300 [ 292.073310][T26476] new_page+0x124/0x170 [ 292.077466][T26476] migrate_pages+0x3b3/0x1540 [ 292.082221][T26476] ? do_mbind+0xfc0/0xfc0 [ 292.086564][T26476] ? remove_migration_ptes+0x90/0x90 [ 292.091936][T26476] do_mbind+0xdc9/0xfc0 [ 292.096093][T26476] __x64_sys_mbind+0x142/0x170 [ 292.100847][T26476] do_syscall_64+0x4a/0x90 [ 292.105263][T26476] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 292.111230][T26476] RIP: 0033:0x4665d9 [ 292.115118][T26476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 292.130641][T26477] FAULT_INJECTION: forcing a failure. [ 292.130641][T26477] name failslab, interval 1, probability 0, space 0, times 0 [ 292.134799][T26476] RSP: 002b:00007f13c7def188 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 292.156030][T26476] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 292.163990][T26476] RDX: 0000000000000000 RSI: 0000000000c00034 RDI: 0000000020012000 [ 292.171949][T26476] RBP: 00007f13c7def1d0 R08: 0000000000000000 R09: 0000010000000003 [ 292.179920][T26476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 292.188059][T26476] R13: 00007ffda012f82f R14: 00007f13c7def300 R15: 0000000000022000 [ 292.196217][T26477] CPU: 0 PID: 26477 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 292.205098][T26477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.215413][T26477] Call Trace: [ 292.218865][T26477] dump_stack+0x137/0x19d [ 292.223279][T26477] should_fail+0x23c/0x250 [ 292.227871][T26477] ? __kernfs_new_node+0x6a/0x330 [ 292.232893][T26477] __should_failslab+0x81/0x90 [ 292.237816][T26477] should_failslab+0x5/0x20 [ 292.242372][T26477] kmem_cache_alloc+0x46/0x2f0 [ 292.247245][T26477] ? __cond_resched+0x11/0x40 [ 292.251907][T26477] __kernfs_new_node+0x6a/0x330 [ 292.256756][T26477] ? idr_alloc_cyclic+0x249/0x2d0 [ 292.261796][T26477] ? rb_insert_color+0x7e/0x310 [ 292.266624][T26477] kernfs_new_node+0x5b/0xd0 [ 292.271197][T26477] __kernfs_create_file+0x45/0x1a0 [ 292.276382][T26477] sysfs_add_file_mode_ns+0x1c1/0x250 [ 292.281913][T26477] internal_create_group+0x2e4/0x850 [ 292.287187][T26477] sysfs_create_group+0x1b/0x20 [ 292.292020][T26477] loop_configure+0xa21/0xcb0 [ 292.296721][T26477] lo_ioctl+0x555/0x11f0 [ 292.300945][T26477] ? path_openat+0x19ab/0x20b0 [ 292.305709][T26477] ? putname+0xa5/0xc0 [ 292.309786][T26477] ? ___cache_free+0x3c/0x300 [ 292.314836][T26477] ? blkdev_common_ioctl+0x9c3/0x1040 [ 292.320199][T26477] ? selinux_file_ioctl+0x8e0/0x970 [ 292.325378][T26477] ? lo_release+0x120/0x120 [ 292.329890][T26477] blkdev_ioctl+0x1d0/0x3c0 [ 292.334419][T26477] block_ioctl+0x6d/0x80 [ 292.338673][T26477] ? blkdev_iopoll+0x70/0x70 [ 292.343313][T26477] __se_sys_ioctl+0xcb/0x140 [ 292.348010][T26477] __x64_sys_ioctl+0x3f/0x50 [ 292.352588][T26477] do_syscall_64+0x4a/0x90 [ 292.357023][T26477] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 292.362899][T26477] RIP: 0033:0x466397 [ 292.366774][T26477] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 292.386361][T26477] RSP: 002b:00007f5b51553e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.394869][T26477] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 292.402849][T26477] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 292.410810][T26477] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 292.418783][T26477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 292.426752][T26477] R13: 0000000000000004 R14: 00000000200006a0 R15: 000000000000002c [ 292.435273][T26477] loop2: detected capacity change from 0 to 264192 [ 292.456926][T26477] loop2: p1 p3 [ 292.460963][T26477] loop2: p1 size 11290111 extends beyond EOD, truncated [ 292.468445][T26465] loop1: detected capacity change from 0 to 152833 [ 292.479301][T26477] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 292.531349][T26465] loop1: p1[EZD] p3 [ 292.537023][T26465] loop1: p1 start 50331648 is beyond EOD, truncated [ 292.544421][T26465] loop1: p3 size 1912633224 extends beyond EOD, truncated 19:55:54 executing program 0 (fault-call:7 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x4000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:54 executing program 2 (fault-call:0 fault-nth:16): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:54 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000004ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:54 executing program 3: unshare(0x2a000400) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x2) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x5966, 0x0, 0x3, 0x6}, 0x10) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 294.336267][T26521] FAULT_INJECTION: forcing a failure. [ 294.336267][T26521] name failslab, interval 1, probability 0, space 0, times 0 [ 294.348997][T26521] CPU: 0 PID: 26521 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 294.357756][T26521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.366910][T26518] loop1: detected capacity change from 0 to 152833 [ 294.367809][T26521] Call Trace: [ 294.367818][T26521] dump_stack+0x137/0x19d [ 294.381876][T26521] should_fail+0x23c/0x250 19:55:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x5000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 294.386304][T26521] ? __kernfs_new_node+0x6a/0x330 [ 294.391859][T26521] __should_failslab+0x81/0x90 [ 294.396633][T26521] should_failslab+0x5/0x20 [ 294.401168][T26521] kmem_cache_alloc+0x46/0x2f0 [ 294.405990][T26521] ? __cond_resched+0x11/0x40 [ 294.410754][T26521] __kernfs_new_node+0x6a/0x330 [ 294.415730][T26521] ? idr_alloc_cyclic+0x249/0x2d0 [ 294.420761][T26521] ? rb_insert_color+0x7e/0x310 [ 294.425615][T26521] kernfs_new_node+0x5b/0xd0 [ 294.430205][T26521] __kernfs_create_file+0x45/0x1a0 19:55:54 executing program 3: unshare(0x2a000400) unshare(0x2020c00) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 294.435321][T26521] sysfs_add_file_mode_ns+0x1c1/0x250 [ 294.440709][T26521] internal_create_group+0x2e4/0x850 [ 294.446014][T26521] sysfs_create_group+0x1b/0x20 [ 294.451014][T26521] loop_configure+0xa21/0xcb0 [ 294.455739][T26521] lo_ioctl+0x555/0x11f0 [ 294.459979][T26521] ? path_openat+0x19ab/0x20b0 [ 294.464743][T26521] ? putname+0xa5/0xc0 [ 294.468866][T26521] ? ___cache_free+0x3c/0x300 [ 294.473862][T26521] ? blkdev_common_ioctl+0x9c3/0x1040 [ 294.479258][T26521] ? selinux_file_ioctl+0x8e0/0x970 [ 294.484530][T26521] ? lo_release+0x120/0x120 [ 294.489067][T26521] blkdev_ioctl+0x1d0/0x3c0 [ 294.493578][T26521] block_ioctl+0x6d/0x80 [ 294.497818][T26521] ? blkdev_iopoll+0x70/0x70 [ 294.502404][T26521] __se_sys_ioctl+0xcb/0x140 [ 294.507108][T26521] __x64_sys_ioctl+0x3f/0x50 [ 294.511710][T26521] do_syscall_64+0x4a/0x90 [ 294.516125][T26521] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 294.522050][T26521] RIP: 0033:0x466397 19:55:54 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) mount(&(0x7f0000000040)=@md0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x1000, 0x0) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 294.526048][T26521] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 294.545778][T26521] RSP: 002b:00007f5b51553e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.554448][T26521] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 294.562520][T26521] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 294.570493][T26521] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 294.578457][T26521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 294.586428][T26521] R13: 0000000000000004 R14: 00000000200006a0 R15: 000000000000002c [ 294.598659][T26525] FAULT_INJECTION: forcing a failure. [ 294.598659][T26525] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 294.601457][T26521] loop2: detected capacity change from 0 to 264192 [ 294.611943][T26525] CPU: 1 PID: 26525 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 294.627167][T26525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 19:55:54 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x420000, 0x108) clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 294.637221][T26525] Call Trace: [ 294.640494][T26525] dump_stack+0x137/0x19d [ 294.644828][T26525] should_fail+0x23c/0x250 [ 294.649246][T26525] __alloc_pages+0x102/0x320 [ 294.653887][T26525] alloc_pages_vma+0x391/0x660 [ 294.658692][T26525] ? page_address_in_vma+0x264/0x300 [ 294.663991][T26525] new_page+0x124/0x170 [ 294.668150][T26525] migrate_pages+0x3b3/0x1540 [ 294.672830][T26525] ? do_mbind+0xfc0/0xfc0 [ 294.677164][T26525] ? remove_migration_ptes+0x90/0x90 [ 294.682494][T26525] do_mbind+0xdc9/0xfc0 [ 294.686735][T26525] __x64_sys_mbind+0x142/0x170 [ 294.691491][T26525] do_syscall_64+0x4a/0x90 [ 294.695911][T26525] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 294.701871][T26525] RIP: 0033:0x4665d9 [ 294.705767][T26525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 294.725539][T26525] RSP: 002b:00007f13c7e10188 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed 19:55:54 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) set_mempolicy(0x2, &(0x7f0000000040)=0xe55, 0x10001) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) [ 294.734186][T26525] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 294.742156][T26525] RDX: 0000000000000000 RSI: 0000000000c00034 RDI: 0000000020012000 [ 294.750128][T26525] RBP: 00007f13c7e101d0 R08: 0000000000000000 R09: 0000010000000003 [ 294.758117][T26525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 294.766085][T26525] R13: 00007ffda012f82f R14: 00007f13c7e10300 R15: 0000000000022000 [ 294.778558][T26518] loop1: p1[EZD] p3 19:55:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x6000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 294.790835][T26518] loop1: p1 start 67108864 is beyond EOD, truncated [ 294.796995][T26521] loop2: p1 p3 [ 294.797500][T26518] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 294.807073][T26521] loop2: p1 size 11290111 extends beyond EOD, truncated [ 294.817838][T26521] loop2: p3 size 1912633224 extends beyond EOD, truncated 19:55:54 executing program 0 (fault-call:7 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4040084, &(0x7f00000000c0)={0xa, 0x0, 0x7fff, @loopback={0x0, 0xac141409}, 0x10004}, 0x1c) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:55:54 executing program 2 (fault-call:0 fault-nth:17): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 294.918271][T26518] loop1: detected capacity change from 0 to 152833 [ 294.946397][T26591] FAULT_INJECTION: forcing a failure. [ 294.946397][T26591] name failslab, interval 1, probability 0, space 0, times 0 [ 294.959039][T26591] CPU: 0 PID: 26591 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 294.967804][T26591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.977858][T26591] Call Trace: [ 294.981128][T26591] dump_stack+0x137/0x19d [ 294.985548][T26591] should_fail+0x23c/0x250 [ 294.989967][T26591] ? __kernfs_new_node+0x6a/0x330 [ 294.994990][T26591] __should_failslab+0x81/0x90 [ 294.999926][T26591] should_failslab+0x5/0x20 [ 295.004424][T26591] kmem_cache_alloc+0x46/0x2f0 [ 295.009200][T26591] __kernfs_new_node+0x6a/0x330 [ 295.014122][T26591] ? __cond_resched+0x11/0x40 [ 295.019064][T26591] ? mutex_lock+0x9/0x30 [ 295.023301][T26591] kernfs_new_node+0x5b/0xd0 [ 295.027877][T26591] __kernfs_create_file+0x45/0x1a0 [ 295.032970][T26591] sysfs_add_file_mode_ns+0x1c1/0x250 [ 295.038400][T26591] internal_create_group+0x2e4/0x850 [ 295.043770][T26591] sysfs_create_group+0x1b/0x20 [ 295.048602][T26591] loop_configure+0xa21/0xcb0 [ 295.053372][T26591] lo_ioctl+0x555/0x11f0 [ 295.057757][T26591] ? path_openat+0x19ab/0x20b0 [ 295.062610][T26591] ? putname+0xa5/0xc0 [ 295.066838][T26591] ? ___cache_free+0x3c/0x300 [ 295.071540][T26591] ? blkdev_common_ioctl+0x9c3/0x1040 [ 295.076912][T26591] ? selinux_file_ioctl+0x8e0/0x970 [ 295.082091][T26591] ? lo_release+0x120/0x120 [ 295.086660][T26591] blkdev_ioctl+0x1d0/0x3c0 [ 295.091145][T26591] block_ioctl+0x6d/0x80 [ 295.095385][T26591] ? blkdev_iopoll+0x70/0x70 [ 295.099955][T26591] __se_sys_ioctl+0xcb/0x140 [ 295.104527][T26591] __x64_sys_ioctl+0x3f/0x50 [ 295.109094][T26591] do_syscall_64+0x4a/0x90 [ 295.113501][T26591] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 295.119417][T26591] RIP: 0033:0x466397 [ 295.123288][T26591] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 295.143006][T26591] RSP: 002b:00007f5b51553e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 295.151406][T26591] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 295.159487][T26591] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 295.167449][T26591] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 295.175399][T26591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 295.183354][T26591] R13: 0000000000000004 R14: 00000000200006a0 R15: 000000000000002c [ 295.191492][T26591] loop2: detected capacity change from 0 to 264192 [ 295.198236][T26518] loop1: p1[EZD] p3 [ 295.202594][T26518] loop1: p1 start 67108864 is beyond EOD, truncated [ 295.209217][T26518] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 295.211354][T26593] FAULT_INJECTION: forcing a failure. [ 295.211354][T26593] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 295.229637][T26593] CPU: 1 PID: 26593 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 295.238513][T26593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.248609][T26593] Call Trace: [ 295.251885][T26593] dump_stack+0x137/0x19d [ 295.256200][T26593] should_fail+0x23c/0x250 [ 295.260600][T26593] __alloc_pages+0x102/0x320 [ 295.265168][T26593] alloc_pages_vma+0x391/0x660 [ 295.269959][T26593] ? page_address_in_vma+0x264/0x300 [ 295.275226][T26593] new_page+0x124/0x170 [ 295.279360][T26593] migrate_pages+0x3b3/0x1540 [ 295.284032][T26593] ? do_mbind+0xfc0/0xfc0 [ 295.288380][T26593] ? remove_migration_ptes+0x90/0x90 [ 295.293719][T26593] do_mbind+0xdc9/0xfc0 [ 295.297854][T26593] __x64_sys_mbind+0x142/0x170 [ 295.302659][T26593] do_syscall_64+0x4a/0x90 [ 295.307118][T26593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 295.313060][T26593] RIP: 0033:0x4665d9 [ 295.316950][T26593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 295.336555][T26593] RSP: 002b:00007f13c7def188 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 295.345046][T26593] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 295.353003][T26593] RDX: 0000000000000000 RSI: 0000000000c00034 RDI: 0000000020012000 [ 295.360964][T26593] RBP: 00007f13c7def1d0 R08: 0000000000000000 R09: 0000010000000003 [ 295.368921][T26593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 295.376869][T26593] R13: 00007ffda012f82f R14: 00007f13c7def300 R15: 0000000000022000 19:55:55 executing program 1: syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000005ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 19:55:55 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x7000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:55 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) socket$inet_udplite(0x2, 0x2, 0x88) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:55 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x40000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:55 executing program 0 (fault-call:7 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) [ 295.411944][T26591] loop2: p1 p3 [ 295.415570][T26591] loop2: p1 size 11290111 extends beyond EOD, truncated 19:55:55 executing program 3: unshare(0x2a000400) unshare(0x40068000) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) r0 = fork() clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 19:55:55 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000040)='\x00', 0x0, 0xffffffffffffffff) fcntl$setstatus(r0, 0x4, 0x42000) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f0000000100)=0x10) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000140)=@ethtool_cmd={0x9, 0x7, 0x61ac29cf, 0x3, 0x6, 0x9, 0x0, 0xdb, 0x9, 0x81, 0x2, 0x0, 0xfffb, 0x9, 0x1, 0x2, [0x5, 0xffffffff]}}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) r3 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) r4 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r4, &(0x7f0000000180)=ANY=[], 0xfffffe53) fcntl$addseals(r4, 0x409, 0x0) close(r4) [ 295.468151][T26591] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 295.498999][T26613] loop1: detected capacity change from 0 to 152833 19:55:55 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x8000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 19:55:55 executing program 2 (fault-call:0 fault-nth:18): syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a260000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 295.552566][ T1033] loop1: p1[EZD] p3 [ 295.565917][ T1033] loop1: p1 start 83886080 is beyond EOD, truncated [ 295.572618][ T1033] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 295.614794][T26638] FAULT_INJECTION: forcing a failure. [ 295.614794][T26638] name failslab, interval 1, probability 0, space 0, times 0 [ 295.627815][T26638] CPU: 1 PID: 26638 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 295.636573][T26638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.646711][T26638] Call Trace: [ 295.649986][T26638] dump_stack+0x137/0x19d [ 295.654311][T26638] should_fail+0x23c/0x250 [ 295.658723][T26638] ? __kernfs_new_node+0x6a/0x330 [ 295.663743][T26638] __should_failslab+0x81/0x90 [ 295.668519][T26638] should_failslab+0x5/0x20 [ 295.673010][T26638] kmem_cache_alloc+0x46/0x2f0 [ 295.677778][T26638] __kernfs_new_node+0x6a/0x330 [ 295.682632][T26638] ? __cond_resched+0x11/0x40 [ 295.687377][T26638] ? mutex_lock+0x9/0x30 [ 295.691631][T26638] kernfs_new_node+0x5b/0xd0 [ 295.696221][T26638] __kernfs_create_file+0x45/0x1a0 [ 295.701354][T26638] sysfs_add_file_mode_ns+0x1c1/0x250 [ 295.706868][T26638] internal_create_group+0x2e4/0x850 [ 295.712202][T26638] sysfs_create_group+0x1b/0x20 [ 295.717117][T26638] loop_configure+0xa21/0xcb0 [ 295.721908][T26638] lo_ioctl+0x555/0x11f0 [ 295.726187][T26638] ? path_openat+0x19ab/0x20b0 [ 295.730948][T26638] ? putname+0xa5/0xc0 [ 295.735010][T26638] ? ___cache_free+0x3c/0x300 [ 295.739686][T26638] ? blkdev_common_ioctl+0x9c3/0x1040 [ 295.745055][T26638] ? selinux_file_ioctl+0x8e0/0x970 [ 295.750255][T26638] ? lo_release+0x120/0x120 [ 295.754756][T26638] blkdev_ioctl+0x1d0/0x3c0 [ 295.759287][T26638] block_ioctl+0x6d/0x80 19:55:55 executing program 3: unshare(0x2a000400) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x19) unshare(0x160a0500) r0 = fork() r1 = clone3(&(0x7f0000000300)={0x900, 0x0, 0x0, 0x0, {0x400001c}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffe53) splice(r2, &(0x7f0000000180)=0x7fff, r2, &(0x7f00000001c0)=0x3f, 0x9, 0x4) prlimit64(r0, 0x9, &(0x7f0000000080)={0x4, 0x2}, 0x0) fcntl$addseals(r2, 0x409, 0x0) r3 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[], 0xfffffe53) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x2002, 0x0) preadv(r4, &(0x7f0000000480)=[{&(0x7f0000000380)=""/220, 0xdc}, {&(0x7f0000000780)=""/150, 0x96}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f0000000240)=""/76, 0x4c}], 0x5, 0x9, 0x3) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x4000, 0x0) setsockopt$inet_MCAST_MSFILTER(r5, 0x0, 0x30, &(0x7f0000000540)={0x0, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1, 0x3, [{{0x2, 0x4e61, @loopback}}, {{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e22, @empty}}]}, 0x210) prlimit64(r1, 0x0, 0x0, &(0x7f0000002840)) fcntl$addseals(r3, 0x409, 0x0) copy_file_range(r3, &(0x7f00000000c0)=0x100000001, r2, &(0x7f0000000100)=0x7fff, 0x6, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r2, 0xc0109428, &(0x7f0000000040)={0x3, 0xfffffffffffffc00}) [ 295.763534][T26638] ? blkdev_iopoll+0x70/0x70 [ 295.768117][T26638] __se_sys_ioctl+0xcb/0x140 [ 295.772914][T26638] __x64_sys_ioctl+0x3f/0x50 [ 295.777608][T26638] do_syscall_64+0x4a/0x90 [ 295.782131][T26638] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 295.788029][T26638] RIP: 0033:0x466397 [ 295.791910][T26638] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 295.811518][T26638] RSP: 002b:00007f5b51553e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 295.819925][T26638] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 295.827985][T26638] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 295.835965][T26638] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 295.843926][T26638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 295.851893][T26638] R13: 0000000000000004 R14: 00000000200006a0 R15: 000000000000002c [ 295.865115][T26621] FAULT_INJECTION: forcing a failure. [ 295.865115][T26621] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 295.878453][T26621] CPU: 0 PID: 26621 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 295.887295][T26621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.897375][T26621] Call Trace: [ 295.900669][T26621] dump_stack+0x137/0x19d [ 295.905063][T26621] should_fail+0x23c/0x250 [ 295.909467][T26621] __alloc_pages+0x102/0x320 [ 295.914054][T26621] alloc_pages_vma+0x391/0x660 [ 295.918850][T26621] ? page_address_in_vma+0x264/0x300 [ 295.924154][T26621] new_page+0x124/0x170 [ 295.928308][T26621] migrate_pages+0x3b3/0x1540 [ 295.933367][T26621] ? do_mbind+0xfc0/0xfc0 [ 295.937697][T26621] ? remove_migration_ptes+0x90/0x90 [ 295.943200][T26621] do_mbind+0xdc9/0xfc0 [ 295.947348][T26621] __x64_sys_mbind+0x142/0x170 [ 295.952115][T26621] do_syscall_64+0x4a/0x90 [ 295.956529][T26621] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 295.962460][T26621] RIP: 0033:0x4665d9 [ 295.963650][T26638] loop2: detected capacity change from 0 to 264192 [ 295.966342][T26621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 295.966361][T26621] RSP: 002b:00007f13c7e10188 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 295.966379][T26621] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 296.008978][T26621] RDX: 0000000000000000 RSI: 0000000000c00034 RDI: 0000000020012000 [ 296.016950][T26621] RBP: 00007f13c7e101d0 R08: 0000000000000000 R09: 0000010000000003 [ 296.024920][T26621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 296.032989][T26621] R13: 00007ffda012f82f R14: 00007f13c7e10300 R15: 0000000000022000 [ 296.046376][T26613] loop1: p1[EZD] p3 19:55:56 executing program 0 (fault-call:7 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00034, 0x0, 0x0, 0x0, 0x10000000003) 19:55:56 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x100000003, 0x3e) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="73797a31c5cc7db275b5d70dce0e525ba482ddef17861d1ccc87a6981c67601172b24399db8bca62a15f2ccef072e27b2c6c8bfe508378ebe0401524b37daee8dd4e3f20aaf11c8f6311339dfc543dc6cbd748eb1d7b66d8cc1cc684898eb55a5ce28f98248b619aec0010436b6f272c1b6cce45e677ef6723ccc8f6944ba743cc6063d998e93d6a94c7647a636ac1dad133e564f69341a9f719acf30d6f80ce84a982b7d68369e8264a86100ddbab1372a416d0375392659508ed11275f324673d938d1b1c6e22697ae708a6af1882639b8037f72fe815225c2539726d522deced6158c"], 0xf0) [ 296.066850][T26613] loop1: p1 start 83886080 is beyond EOD, truncated [ 296.073504][T26613] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 296.086526][T26638] loop2: p1 p3 [ 296.092808][T26638] loop2: p1 size 11290111 extends beyond EOD, truncated [ 296.103059][T26638] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 296.178737][T26613] loop1: detected capacity change from 0 to 152833 [ 296.217536][T26613] loop1: p1[EZD] p3 [ 296.222416][T26613] loop1: p1 start 83886080 is beyond EOD, truncated [ 296.229180][T26613] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 296.293009][T26685] ==================================================================