154b731f3699c3df0fd13bb83ed79a4d50e7a262b4533a4512648d746b0a268232af6ac6f96bed5fa193fef9a973c07f08b7139a05ad116f", 0x1000}, {&(0x7f0000004f00)="b299363fc2141fc920dcdd31a402ac4902458faabbd3b3f35c90992aba3491d3c31f35f3f8d4fcf3ca399a736c9cee714f328f17a25c8891045706ee48959ee46243d6c39fd27de1004d3c51d16b85c319cf8ced61efe82d7d33ea2a85d23baaf4748cfbc561eec032bdaecae9001c0622cc8e5952c5e2f5beb44d5f25a986f68ce501ad918e5b0e87cc0b035e58ee2d1b3a63d2596b", 0x96}, {&(0x7f0000004fc0)="6b298fc9c14616e781d64a4eae88659adc764cbe1f54c8e9b640c2671fb425db5d59ce105ae0d4c624aaad031a721f84986ef1f6c2949bcc00c199c66bb8e1e3f7f0d9d58b813e0daa210473977fdb25d02a64e49b95851905ddb3076dac91c6f41842a0e36a4b3c575feb97a95357ee9c2c9a3e051068", 0x77}, {&(0x7f0000005040)="29b56823b97cc0c0f1090fad3c138d7bd76c3c297bdd", 0x16}, {&(0x7f0000005080)="70cb4d8a1d8987e973c27ae557d90a283acb30c26d5817ff05ea", 0x1a}, {&(0x7f00000050c0)="5f59c7c1caab5133f7e3085321a8379e442052e0aa260ad43f941f60e59cb9197a06625a5783acadf6d8868daad28267ce10ef4e1425353bad75db85d765a1d58ac982c357de42a5ca74fcb972e0391f235c30fd69c8e2eef445ae6b7da102cf2c906b5a832776a15f0e8b10ea9f96dde45376782f63bd0da4c16e312e77fd895d2f8fed2fe1eb69becc0758ddf96a10efe43e5b02ea5a29f07a4e397c691f", 0x9f}], 0xa, &(0x7f0000005380)=[@rights={{0x20, 0x1, 0x1, [r0, r6, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r2, 0xffffffffffffffff, r2]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r9, r5, r10, r5, r11]}}, @rights={{0x1c, 0x1, 0x1, [r0, r12, r0]}}], 0xb0}}], 0x6, 0x20000011) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x1c, r8, 0xf}, 0x1c}}, 0x0) (async) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000bc0)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x14208}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x2c, r8, 0xf17, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'geneve0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x900], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:38 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0xd00000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:38 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) (fail_nth: 7) 15:49:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xa00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 190.566033][T15382] xt_CT: You must specify a L4 protocol and not use inversions on it [ 190.597894][T15389] xt_CT: You must specify a L4 protocol and not use inversions on it [ 190.618549][T15386] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15386 comm=syz-executor.2 [ 190.619296][T15392] loop4: detected capacity change from 0 to 256 15:49:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x5865, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xb00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:38 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xc0}}) [ 190.653094][T15397] loop1: detected capacity change from 0 to 256 15:49:38 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0xe00000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 190.667175][T15398] xt_CT: You must specify a L4 protocol and not use inversions on it [ 190.697266][T15405] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15405 comm=syz-executor.2 [ 190.706045][T15406] FAULT_INJECTION: forcing a failure. [ 190.706045][T15406] name failslab, interval 1, probability 0, space 0, times 0 [ 190.723005][T15392] FAT-fs (loop4): Unrecognized mount option "nodotsnodlax4¤õ—]eW@e?" or missing value [ 190.730845][T15406] CPU: 1 PID: 15406 Comm: syz-executor.5 Not tainted 6.6.0-rc4-syzkaller-00284-gb9ddbb0cde2a #0 [ 190.730874][T15406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 190.761212][T15406] Call Trace: [ 190.764498][T15406] [ 190.767438][T15406] dump_stack_lvl+0xda/0x130 [ 190.772055][T15406] dump_stack+0x15/0x20 [ 190.776268][T15406] should_fail_ex+0x21f/0x230 [ 190.781017][T15406] ? register_netdevice+0x176/0xb20 [ 190.786229][T15406] __should_failslab+0x92/0xa0 [ 190.791018][T15406] should_failslab+0x9/0x20 [ 190.795611][T15406] slab_pre_alloc_hook+0x38/0x180 [ 190.800641][T15406] ? register_netdevice+0x176/0xb20 [ 190.805845][T15406] __kmem_cache_alloc_node+0x48/0x1d0 [ 190.811224][T15406] ? full_name_hash+0x93/0xe0 [ 190.815918][T15406] ? register_netdevice+0x176/0xb20 [ 190.821120][T15406] kmalloc_trace+0x2a/0xa0 [ 190.825634][T15406] register_netdevice+0x176/0xb20 [ 190.830744][T15406] ? alloc_netdev_mqs+0x883/0x8a0 [ 190.835877][T15406] ip6gre_tunnel_locate+0x1c9/0x490 [ 190.841112][T15406] ? should_fail_ex+0xd1/0x230 [ 190.846020][T15406] ip6gre_tunnel_siocdevprivate+0x8ea/0xa60 [ 190.852021][T15406] ? ip6gre_tunnel_init+0x100/0x100 [ 190.857234][T15406] dev_ifsioc+0x82f/0x9e0 [ 190.861603][T15406] dev_ioctl+0x8d8/0xa90 [ 190.865860][T15406] sock_ioctl+0x5aa/0x630 [ 190.870288][T15406] ? sock_poll+0x260/0x260 [ 190.874762][T15406] __se_sys_ioctl+0xcf/0x140 [ 190.879415][T15406] __x64_sys_ioctl+0x43/0x50 [ 190.884093][T15406] do_syscall_64+0x41/0xc0 [ 190.888564][T15406] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 190.894553][T15406] RIP: 0033:0x7ff02dd72ae9 [ 190.898973][T15406] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 190.918675][T15406] RSP: 002b:00007ff02d0d40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 190.927154][T15406] RAX: ffffffffffffffda RBX: 00007ff02de92050 RCX: 00007ff02dd72ae9 [ 190.935127][T15406] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000003 15:49:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xc00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xd00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x5900, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 190.943096][T15406] RBP: 00007ff02d0d4120 R08: 0000000000000000 R09: 0000000000000000 [ 190.951069][T15406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 190.959102][T15406] R13: 000000000000006e R14: 00007ff02de92050 R15: 00007ffc12b72038 [ 190.967083][T15406] 15:49:38 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder1\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000009c0)={0x50, 0x0, &(0x7f0000000900)=[@register_looper, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000840)={@fd, @ptr={0x70742a85, 0x0, &(0x7f00000007c0)=""/121, 0x79, 0x2, 0x30}, @fd}, &(0x7f00000008c0)={0x0, 0x18, 0x40}}}, @increfs={0x40046304, 0x3}], 0x12, 0x0, &(0x7f0000000980)="c4f2d981c88c9985e6fd45e3f562376e87e8"}) (async) r1 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f646f74731a6e6f641b6c617834a4f5970f5d655740653f"], 0x2, 0x183, &(0x7f00000005c0)="$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") (async) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0\x00'}) (async) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000a00)={@in6={{0xa, 0x4e24, 0x3ff, @mcast2, 0x9}}, 0x0, 0x0, 0x48, 0x0, "191f52f26a4faac2cccfc5f9dd31621dd9a9fb7865228b2dee328bd95e47ddf288bb9da5fc97653c2749ed2682908f696af92402080b42f312e547b2c50a80d60328ed00a9c87d9f85586c048c25d2d5"}, 0xd8) (async) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r2) sendmsg$NL80211_CMD_SET_MPATH(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r4, 0x800, 0x70bd29, 0x25dfdbfc, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x20040011}, 0x2784b1e951ea0197) (async) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x13, r1, 0x20003000) r5 = syz_open_dev$vcsn(&(0x7f00000003c0), 0x3, 0x101801) (async, rerun: 32) r6 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GET(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x14, r7, 0x1}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SPLIT(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xd4, r7, 0x20, 0x70bd28, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@nsim={{0xe}, {0xfffffe76, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x3}}]}, 0xd4}}, 0x40c1) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$rds(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000005340)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async, rerun: 64) r10 = socket$rds(0x15, 0x5, 0x0) (rerun: 64) bind$rds(r10, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) (async) sendmsg$rds(r10, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async, rerun: 32) r11 = socket$rds(0x15, 0x5, 0x0) (rerun: 32) bind$rds(r11, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) (async) sendmsg$rds(r11, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) r12 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005440)=[{{&(0x7f0000000c40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000e40)=[{&(0x7f0000000cc0)="9a9eff9b57a0b6b86392b2c258fda89a5d8c2fa183d8fe693e00ed0ffd0ed73d01f6a80fc3ce1012302b8179f800df55c8a2b5f39c5689b49ec474750df872eb0399414f72ba", 0x46}, {&(0x7f0000000d40)="5170e3688fb11007430741083cc0073ca475860f3b5b57a16bca89", 0x1b}, {&(0x7f0000000d80)="dd9a8a21fbce7d51d2d481d612d2a8d8f1c04cf333412dbb7191a989fb324229da5aa832897ef94254f93d8ce84b5cf27a1315301831f809874400b2ccd5c8bb5821e425a1f60d3c799ca458b0137bda64187fa1a71c967a7af80b7fc2fb27fce0f325fd1de2ddb0db5b56ef3730da15bb8d0da47ac69bbdb938e9026548e0f15abea95372e93d0f0a3ec990fb3de75756ec3ddf045df0ec4aaee3fe5972073f22fa65b01bf178f9e0b950c6c1a0fd5e3a9a429edb8504b6d9", 0xb9}], 0x3, &(0x7f0000000e80)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32=r3, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000590000000000006d72381875f12ee12bc05039edb957c27b917d8d2b9f1fd1bfa002f42ea65c6b12a7", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x68, 0x4000010}}, {{&(0x7f0000001000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000010c0)=[{&(0x7f0000001080)="9e6d0d3484b19c732b929c8d71f7c66beacfab1159929795f3b38fba1bb9833aaa18", 0x22}], 0x1, &(0x7f0000001180)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x20, 0x4000000}}, {{&(0x7f00000011c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002480)=[{&(0x7f0000001240)="a237d804cdef9fcef23458dcc583fc3f652d794501571413623f2ec46f3ac03361911b18e88303cc56eb75", 0x2b}, {&(0x7f0000001280)="b16391bf220970fb68345b76590fa2fae4104ae54411b726c0926b69572d8ad40bc5b1961bb79ee2d786f8865dc0257025375d25a6ba68d05a7cdb325ad65be23fe2a0e87a2c934cce3270cfc81cc3354e6179bbbae6d20c9ba8920d9c8b72c93fffb3eac3cb864241886ea5f97be60c15a874b4b89504bb6c92d598e224134fa9355accc725856244499ebf0fa5b35b80ca9a9dac2888efd894cbc610067e6f36ee029cf0bbb5327ea47cb1c325a415f3d4a988de0a2bd5440ecca0058cd7b95ec9cd092f758fd038ea55f58719a56267f8da72775a9e7399bdcdc12c76ec941937de09", 0xe4}, {&(0x7f0000001380)="44f94df6", 0x4}, {&(0x7f00000013c0)="17caab008330e168c4f5c798f5009315456ab3eb2acfdecab903f163b0a90f10a7210040d67d6ed0b77a177bb420673a62f9dafafa94d410d2d4f10c78d1316ee1567073fca062dd77b23e87478b7fc3ac8e6c5bdc9fbdcedf0048c847a7be44a4626e51335cea2a80f642ba27ea8da57759bbd85a6836f3c568a3586244e581045a0eb3cf6c04df2aa030ed953982fd9d3badb057c970170dc41c26ef9c7e16e67b35388eb4efce0be83a3a7fc9b13164a9089fe0f916c4dd1dabc72b3c298f", 0xc0}, {&(0x7f0000001480)="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", 0x1000}], 0x5, &(0x7f0000002500)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r2, r2, r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee00}}}, @cred={{0x1c}}], 0x60, 0x14}}, {{&(0x7f0000002580)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000026c0)=[{&(0x7f0000002600)="ccef5083147b72833d038e09ed05b4c06802851e606a8861fd6701410f14dbc7b4ae0beda3ace877a09d6bd1850233af8c40c2db11da4c8d871bce8d52510ffa35543584b5f3d7c5fc6788cc2b7aac25b029393b21186952d10cea35fae33e8d54b8edf02fc92493c2d4ddc61177b6f1e81beec565df17038c259026b50926d6276ffa5b69549582c2a1d5e2244996c2076bab1552235665b9e45e16483d6bdc", 0xa0}], 0x1, 0x0, 0x0, 0x20000010}}, {{&(0x7f0000002700)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002b00)=[{&(0x7f0000002780)="72ec87b3d98638e7e61059d2f5a866dbe931a2411bf01e215f2c8cb9ba9236d168f73e3eab359744431f6ee3deec3ad72cb256b9ed705a28f961776cafe87a0bc64188a28066503b3445caeabc91c453ce6c6cde42e2", 0x56}, {&(0x7f0000002800)="6f815b6a41692174ee073b1b76930e7fcea51413a07bff70d9aae5ec0dc06d846cb6c851aeaf3cb5cbb787a7ceeea7d9ed8a693f458e66", 0x37}, {&(0x7f0000002840)="6aebc7ff47101890ed18195057f62e5a9be18aee6ba235481738619a2705839c760266db04a5e22f0644394b1fd06900aba89627f6b97c17eac9501af3c86fde7b745cb4a308c9b15a1de6d120e56bcd8b7db195903883df4e5c3b1ffde7324d5564e860e1ec7a6306a2e2bd90f88dc9632e83d84e28482203cf891fda3a5d1188effaabba9e8f5c47072c4516e13918b831d95efcd4ce433cd9bc4ac9b3708d5aa5e9b321f691ff78213350732e8b88b1ca5ffca4c30e922790b5aad2de7c63d678a40f", 0xc4}, {&(0x7f0000002940)="b1c42b8f7143638d100327d532e95724dde20980c32f53c9d6e47d355acafde6311b9e08d1f74190eb2daa3adf2691775d6a6d6c63d860c91aaf7beb235e446258a10af425c3fd6ab99b3c8b94ee97942d0b5f9c5754e6001b604fa1f2f0f0c096b29f9a5e02284793b151ca1b890f9286dcefbbd9e88aa1ee02de582368b9948df23657d735c156c12f8b6e9209d98d7ea432e2e338a8b1974838a361", 0x9d}, {&(0x7f0000002a00)="a4f7b8af0c2be81d2d3094f13c18cfdda92d2b35a4926dbe9f4019206cf43cedad011bd216446b61131bafc6221bb5faf9b1dc89eee7ecc45e614ef4e0c9a7e92066923e752e28c9b9cbc681498e2843c13cfec84634a35b51e3b868e52a7639cac096940b1cbe65303c5cb08bf6b22d70a76c", 0x73}, {&(0x7f0000002a80)="7505cf2cf446f79215e3dd97743f522c269107821a15799de96cca0f07d8e0feaa984ad99e0462d98809e30c53e878291ae96b9b15cc2758a40f4c1532ce47f42f6948fc7d6f74cb5d18ef984cc9bdcb42ee3c37d6e3b072be95", 0x5a}], 0x6, &(0x7f0000002c80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r0, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0xa8, 0x4008030}}, {{&(0x7f0000002d40)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000005180)=[{&(0x7f0000002dc0)="78c8d84581f4a61d03b0270a006b32df226c1a6abb18555307c8ccb0344dddd286a4335354a1bf8b", 0x28}, {&(0x7f0000002e00)="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", 0x1000}, {&(0x7f0000003e00)="3f7db3623a32f418cdfa3f4a46649f5724f9cca08ee38533932dd24e9358579ba0b2f53fca5fbb99f4a036641de54733766d2fa7a11afca902fa7556", 0x3c}, {&(0x7f0000003e40)="6a732d32210b5bb49c880f9c242b50e4f2ed6c6056c6ae0fbcf7d98cf6545bca4bde7c2882327da85b25bcb66d820af5d3e0e2e71cbf872538a24e03e12b4b155394f9cc0bfaece328956441fb1021caf7f9639a1a9271928ae0a3d706df2263585fc86ef0069dc52fc1850a8102ec2f41dab030beea6a25554ca051ff9089fabc843d9525", 0x85}, {&(0x7f0000003f00)="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", 0x1000}, {&(0x7f0000004f00)="b299363fc2141fc920dcdd31a402ac4902458faabbd3b3f35c90992aba3491d3c31f35f3f8d4fcf3ca399a736c9cee714f328f17a25c8891045706ee48959ee46243d6c39fd27de1004d3c51d16b85c319cf8ced61efe82d7d33ea2a85d23baaf4748cfbc561eec032bdaecae9001c0622cc8e5952c5e2f5beb44d5f25a986f68ce501ad918e5b0e87cc0b035e58ee2d1b3a63d2596b", 0x96}, {&(0x7f0000004fc0)="6b298fc9c14616e781d64a4eae88659adc764cbe1f54c8e9b640c2671fb425db5d59ce105ae0d4c624aaad031a721f84986ef1f6c2949bcc00c199c66bb8e1e3f7f0d9d58b813e0daa210473977fdb25d02a64e49b95851905ddb3076dac91c6f41842a0e36a4b3c575feb97a95357ee9c2c9a3e051068", 0x77}, {&(0x7f0000005040)="29b56823b97cc0c0f1090fad3c138d7bd76c3c297bdd", 0x16}, {&(0x7f0000005080)="70cb4d8a1d8987e973c27ae557d90a283acb30c26d5817ff05ea", 0x1a}, {&(0x7f00000050c0)="5f59c7c1caab5133f7e3085321a8379e442052e0aa260ad43f941f60e59cb9197a06625a5783acadf6d8868daad28267ce10ef4e1425353bad75db85d765a1d58ac982c357de42a5ca74fcb972e0391f235c30fd69c8e2eef445ae6b7da102cf2c906b5a832776a15f0e8b10ea9f96dde45376782f63bd0da4c16e312e77fd895d2f8fed2fe1eb69becc0758ddf96a10efe43e5b02ea5a29f07a4e397c691f", 0x9f}], 0xa, &(0x7f0000005380)=[@rights={{0x20, 0x1, 0x1, [r0, r6, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r2, 0xffffffffffffffff, r2]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r9, r5, r10, r5, r11]}}, @rights={{0x1c, 0x1, 0x1, [r0, r12, r0]}}], 0xb0}}], 0x6, 0x20000011) (async) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x1c, r8, 0xf}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000bc0)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x14208}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x2c, r8, 0xf17, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'geneve0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xe00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:38 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) (fail_nth: 8) 15:49:38 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {@nodots}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="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"]) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="6f940d8656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x1100], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x5a00, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 191.036986][T15421] loop1: detected capacity change from 0 to 256 [ 191.045927][T15422] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15422 comm=syz-executor.2 15:49:38 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xc1}}) 15:49:38 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0xf00000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x1200], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 191.110982][T15434] loop4: detected capacity change from 0 to 256 [ 191.122078][T15438] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15438 comm=syz-executor.2 [ 191.123109][T15440] FAULT_INJECTION: forcing a failure. [ 191.123109][T15440] name failslab, interval 1, probability 0, space 0, times 0 [ 191.147592][T15440] CPU: 0 PID: 15440 Comm: syz-executor.5 Not tainted 6.6.0-rc4-syzkaller-00284-gb9ddbb0cde2a #0 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x12e8], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x1302], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x1600], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 191.158119][T15440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 191.168190][T15440] Call Trace: [ 191.171491][T15440] [ 191.174454][T15440] dump_stack_lvl+0xda/0x130 [ 191.179175][T15440] dump_stack+0x15/0x20 [ 191.183359][T15440] should_fail_ex+0x21f/0x230 [ 191.188264][T15440] __should_failslab+0x92/0xa0 [ 191.193105][T15440] should_failslab+0x9/0x20 [ 191.197699][T15440] slab_pre_alloc_hook+0x38/0x180 [ 191.202760][T15440] kmem_cache_alloc_bulk+0x4f/0x280 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x2500], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x2501], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 191.207981][T15440] ? __slab_free+0x5f/0x260 [ 191.212539][T15440] __napi_alloc_skb+0x2e9/0x3c0 [ 191.217426][T15440] napi_get_frags+0x4e/0xd0 [ 191.221971][T15440] ? napi_get_frags_check+0x18/0x80 [ 191.227273][T15440] napi_get_frags_check+0x2b/0x80 [ 191.232386][T15440] netif_napi_add_weight+0x578/0x6f0 [ 191.237720][T15440] gro_cells_init+0x126/0x170 [ 191.242421][T15440] ip6gre_tunnel_init_common+0x17a/0x550 [ 191.248098][T15440] ip6gre_tunnel_init+0x1a/0x100 [ 191.253069][T15440] register_netdevice+0x213/0xb20 [ 191.258120][T15440] ? alloc_netdev_mqs+0x883/0x8a0 [ 191.263180][T15440] ip6gre_tunnel_locate+0x1c9/0x490 [ 191.268412][T15440] ? should_fail_ex+0xd1/0x230 [ 191.273269][T15440] ip6gre_tunnel_siocdevprivate+0x8ea/0xa60 [ 191.279251][T15440] ? ip6gre_tunnel_init+0x100/0x100 [ 191.284514][T15440] dev_ifsioc+0x82f/0x9e0 [ 191.288870][T15440] dev_ioctl+0x8d8/0xa90 [ 191.293199][T15440] sock_ioctl+0x5aa/0x630 [ 191.297608][T15440] ? sock_poll+0x260/0x260 [ 191.302100][T15440] __se_sys_ioctl+0xcf/0x140 [ 191.306772][T15440] __x64_sys_ioctl+0x43/0x50 [ 191.311362][T15440] do_syscall_64+0x41/0xc0 [ 191.315783][T15440] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 191.321855][T15440] RIP: 0033:0x7ff02dd72ae9 [ 191.326282][T15440] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 191.346048][T15440] RSP: 002b:00007ff02d0d40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 191.354470][T15440] RAX: ffffffffffffffda RBX: 00007ff02de92050 RCX: 00007ff02dd72ae9 [ 191.362478][T15440] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000003 [ 191.370459][T15440] RBP: 00007ff02d0d4120 R08: 0000000000000000 R09: 0000000000000000 [ 191.378429][T15440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.386413][T15440] R13: 000000000000006e R14: 00007ff02de92050 R15: 00007ffc12b72038 [ 191.394411][T15440] 15:49:39 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) (fail_nth: 9) 15:49:39 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {@nodots}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="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"]) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="6f940d8656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {@nodots}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="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"]) (async) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) (async) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="6f940d8656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x3801], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x5c00, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:39 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xd9}}) 15:49:39 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x1000000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 191.426173][T15457] loop1: detected capacity change from 0 to 256 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x3a02], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:39 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x1100000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:39 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {@nodots}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="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"]) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="6f940d8656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {@nodots}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="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"]) (async) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) (async) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="6f940d8656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x3e03], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 191.473953][T15466] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15466 comm=syz-executor.2 [ 191.488317][T15468] loop4: detected capacity change from 0 to 256 [ 191.497424][T15463] loop1: detected capacity change from 0 to 256 [ 191.551175][T15470] FAULT_INJECTION: forcing a failure. [ 191.551175][T15470] name failslab, interval 1, probability 0, space 0, times 0 [ 191.563916][T15470] CPU: 1 PID: 15470 Comm: syz-executor.5 Not tainted 6.6.0-rc4-syzkaller-00284-gb9ddbb0cde2a #0 [ 191.574373][T15470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 191.579393][T15484] loop4: detected capacity change from 0 to 256 [ 191.584455][T15470] Call Trace: [ 191.584464][T15470] [ 191.584472][T15470] dump_stack_lvl+0xda/0x130 [ 191.584505][T15470] dump_stack+0x15/0x20 [ 191.605816][T15470] should_fail_ex+0x21f/0x230 [ 191.610534][T15470] ? kstrdup_const+0x3e/0x50 [ 191.615230][T15470] __should_failslab+0x92/0xa0 [ 191.620016][T15470] should_failslab+0x9/0x20 [ 191.624612][T15470] slab_pre_alloc_hook+0x38/0x180 [ 191.629655][T15470] ? kstrdup_const+0x3e/0x50 [ 191.634339][T15470] __kmem_cache_alloc_node+0x48/0x1d0 [ 191.639856][T15470] ? kstrdup_const+0x3e/0x50 [ 191.644498][T15470] __kmalloc_node_track_caller+0x96/0x1a0 15:49:39 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xec}}) 15:49:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x5e00, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 191.650346][T15470] kstrdup+0x3a/0x70 [ 191.654303][T15470] kstrdup_const+0x3e/0x50 [ 191.658767][T15470] kvasprintf_const+0xe5/0xf0 [ 191.663494][T15470] kobject_set_name_vargs+0x44/0xe0 [ 191.668761][T15470] dev_set_name+0x84/0xb0 [ 191.673129][T15470] ? hrtimer_init+0x104/0x1f0 [ 191.674346][T15495] loop1: detected capacity change from 0 to 256 [ 191.677917][T15470] ? netdev_register_kobject+0x63/0x230 [ 191.677950][T15470] ? swiotlb_dev_init+0x19/0x30 [ 191.694763][T15470] ? device_initialize+0x1fe/0x210 [ 191.699939][T15470] netdev_register_kobject+0x7c/0x230 [ 191.705347][T15470] register_netdevice+0x650/0xb20 [ 191.710407][T15470] ip6gre_tunnel_locate+0x1c9/0x490 [ 191.715735][T15470] ? should_fail_ex+0xd1/0x230 [ 191.720533][T15470] ip6gre_tunnel_siocdevprivate+0x8ea/0xa60 [ 191.726457][T15470] ? ip6gre_tunnel_init+0x100/0x100 [ 191.731778][T15470] dev_ifsioc+0x82f/0x9e0 [ 191.736116][T15470] dev_ioctl+0x8d8/0xa90 [ 191.740364][T15470] sock_ioctl+0x5aa/0x630 [ 191.744795][T15470] ? sock_poll+0x260/0x260 [ 191.749222][T15470] __se_sys_ioctl+0xcf/0x140 [ 191.753844][T15470] __x64_sys_ioctl+0x43/0x50 [ 191.758512][T15470] do_syscall_64+0x41/0xc0 [ 191.763050][T15470] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 191.769131][T15470] RIP: 0033:0x7ff02dd72ae9 [ 191.773546][T15470] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 191.793211][T15470] RSP: 002b:00007ff02d0f50c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 191.801672][T15470] RAX: ffffffffffffffda RBX: 00007ff02de91f80 RCX: 00007ff02dd72ae9 [ 191.809646][T15470] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000003 [ 191.817702][T15470] RBP: 00007ff02d0f5120 R08: 0000000000000000 R09: 0000000000000000 [ 191.825690][T15470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.833746][T15470] R13: 000000000000000b R14: 00007ff02de91f80 R15: 00007ffc12b72038 [ 191.841723][T15470] 15:49:39 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x1200000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:39 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f0d17723159662803c456062c6e6f646f7473"], 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000140)={0x60000005}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x4800], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:39 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) (fail_nth: 10) [ 191.847691][T15498] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15498 comm=syz-executor.2 [ 191.885803][T15503] loop4: detected capacity change from 0 to 256 15:49:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x5f00, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x4802], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 191.897516][T15503] FAT-fs (loop4): Unrecognized mount option "nor1Yf(ÄV" or missing value [ 191.911120][T15507] loop1: detected capacity change from 0 to 256 [ 191.926635][T15509] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15509 comm=syz-executor.2 [ 191.941332][T15505] FAULT_INJECTION: forcing a failure. 15:49:39 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x125}}) 15:49:39 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x1300000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x4c00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x4d00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 191.941332][T15505] name failslab, interval 1, probability 0, space 0, times 0 [ 191.954016][T15505] CPU: 0 PID: 15505 Comm: syz-executor.5 Not tainted 6.6.0-rc4-syzkaller-00284-gb9ddbb0cde2a #0 [ 191.964619][T15505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 191.974752][T15505] Call Trace: [ 191.978049][T15505] [ 191.980995][T15505] dump_stack_lvl+0xda/0x130 [ 191.985631][T15505] dump_stack+0x15/0x20 [ 191.989933][T15505] should_fail_ex+0x21f/0x230 [ 191.994651][T15505] ? kstrdup_const+0x3e/0x50 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x5a03], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x6002], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 191.999296][T15505] __should_failslab+0x92/0xa0 [ 192.004117][T15505] should_failslab+0x9/0x20 [ 192.008705][T15505] slab_pre_alloc_hook+0x38/0x180 [ 192.013760][T15505] ? kstrdup_const+0x3e/0x50 [ 192.018376][T15505] __kmem_cache_alloc_node+0x48/0x1d0 [ 192.023828][T15505] ? kstrdup_const+0x3e/0x50 [ 192.028471][T15505] __kmalloc_node_track_caller+0x96/0x1a0 [ 192.034280][T15505] kstrdup+0x3a/0x70 [ 192.038254][T15505] kstrdup_const+0x3e/0x50 [ 192.042737][T15505] kvasprintf_const+0xe5/0xf0 [ 192.047470][T15505] kobject_set_name_vargs+0x44/0xe0 15:49:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x6503], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 192.052807][T15505] dev_set_name+0x84/0xb0 [ 192.057208][T15505] ? hrtimer_init+0x104/0x1f0 [ 192.061957][T15505] ? netdev_register_kobject+0x63/0x230 [ 192.067531][T15505] ? swiotlb_dev_init+0x19/0x30 [ 192.072427][T15505] ? device_initialize+0x1fe/0x210 [ 192.077570][T15505] netdev_register_kobject+0x7c/0x230 [ 192.083045][T15505] register_netdevice+0x650/0xb20 [ 192.088097][T15505] ip6gre_tunnel_locate+0x1c9/0x490 [ 192.093318][T15505] ? should_fail_ex+0xd1/0x230 [ 192.098112][T15505] ip6gre_tunnel_siocdevprivate+0x8ea/0xa60 [ 192.104058][T15505] ? ip6gre_tunnel_init+0x100/0x100 [ 192.109280][T15505] dev_ifsioc+0x82f/0x9e0 [ 192.113686][T15505] dev_ioctl+0x8d8/0xa90 [ 192.118016][T15505] sock_ioctl+0x5aa/0x630 [ 192.122373][T15505] ? sock_poll+0x260/0x260 [ 192.126822][T15505] __se_sys_ioctl+0xcf/0x140 [ 192.131414][T15505] __x64_sys_ioctl+0x43/0x50 [ 192.136008][T15505] do_syscall_64+0x41/0xc0 [ 192.140433][T15505] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 192.146334][T15505] RIP: 0033:0x7ff02dd72ae9 [ 192.150750][T15505] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 192.170483][T15505] RSP: 002b:00007ff02d0f50c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 192.178963][T15505] RAX: ffffffffffffffda RBX: 00007ff02de91f80 RCX: 00007ff02dd72ae9 [ 192.186965][T15505] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000003 [ 192.194930][T15505] RBP: 00007ff02d0f5120 R08: 0000000000000000 R09: 0000000000000000 15:49:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x6800], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:40 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) (fail_nth: 11) 15:49:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:40 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x171}}) 15:49:40 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f0d17723159662803c456062c6e6f646f7473"], 0x2, 0x183, &(0x7f00000005c0)="$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") (async, rerun: 32) r0 = accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) (rerun: 32) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000140)={0x60000005}) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (rerun: 32) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:40 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x2000000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 192.202945][T15505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 192.210924][T15505] R13: 000000000000000b R14: 00007ff02de91f80 R15: 00007ffc12b72038 [ 192.219004][T15505] [ 192.243477][T15529] loop1: detected capacity change from 0 to 256 15:49:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x6c00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6400, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x7101], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 192.320304][T15541] loop4: detected capacity change from 0 to 256 [ 192.336866][T15549] FAULT_INJECTION: forcing a failure. [ 192.336866][T15549] name failslab, interval 1, probability 0, space 0, times 0 [ 192.349596][T15549] CPU: 1 PID: 15549 Comm: syz-executor.5 Not tainted 6.6.0-rc4-syzkaller-00284-gb9ddbb0cde2a #0 [ 192.360048][T15549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 192.370124][T15549] Call Trace: [ 192.373410][T15549] [ 192.376417][T15549] dump_stack_lvl+0xda/0x130 [ 192.381018][T15549] dump_stack+0x15/0x20 [ 192.385260][T15549] should_fail_ex+0x21f/0x230 [ 192.389985][T15549] __should_failslab+0x92/0xa0 [ 192.394771][T15549] should_failslab+0x9/0x20 [ 192.399329][T15549] slab_pre_alloc_hook+0x38/0x180 [ 192.404377][T15549] kmem_cache_alloc+0x52/0x220 [ 192.409150][T15549] ? __kernfs_new_node+0x6a/0x380 [ 192.414279][T15549] __kernfs_new_node+0x6a/0x380 [ 192.419151][T15549] ? make_kgid+0x115/0x310 [ 192.423630][T15549] ? net_ns_get_ownership+0xae/0xd0 [ 192.428842][T15549] ? net_namespace+0x20/0x20 [ 192.433445][T15549] kernfs_create_dir_ns+0x62/0x150 [ 192.438600][T15549] sysfs_create_dir_ns+0xd7/0x1d0 [ 192.443756][T15549] kobject_add_internal+0x3eb/0x730 [ 192.448997][T15549] kobject_add+0xdc/0x150 [ 192.453330][T15549] ? kobject_get+0x95/0xc0 [ 192.457751][T15549] ? kobject_put+0xd8/0x160 [ 192.462255][T15549] ? device_add+0x2ea/0x8b0 [ 192.466815][T15549] device_add+0x2f8/0x8b0 [ 192.471208][T15549] netdev_register_kobject+0xfc/0x230 [ 192.476608][T15549] register_netdevice+0x650/0xb20 [ 192.481681][T15549] ip6gre_tunnel_locate+0x1c9/0x490 [ 192.486891][T15549] ? should_fail_ex+0xd1/0x230 [ 192.491804][T15549] ip6gre_tunnel_siocdevprivate+0x8ea/0xa60 [ 192.497753][T15549] ? ip6gre_tunnel_init+0x100/0x100 [ 192.502979][T15549] dev_ifsioc+0x82f/0x9e0 [ 192.507338][T15549] dev_ioctl+0x8d8/0xa90 [ 192.511630][T15549] sock_ioctl+0x5aa/0x630 [ 192.515987][T15549] ? sock_poll+0x260/0x260 [ 192.520481][T15549] __se_sys_ioctl+0xcf/0x140 [ 192.525089][T15549] __x64_sys_ioctl+0x43/0x50 [ 192.529696][T15549] do_syscall_64+0x41/0xc0 [ 192.534118][T15549] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 192.540132][T15549] RIP: 0033:0x7ff02dd72ae9 [ 192.544551][T15549] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 192.564279][T15549] RSP: 002b:00007ff02d0d40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 192.572766][T15549] RAX: ffffffffffffffda RBX: 00007ff02de92050 RCX: 00007ff02dd72ae9 [ 192.580741][T15549] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000003 [ 192.588839][T15549] RBP: 00007ff02d0d4120 R08: 0000000000000000 R09: 0000000000000000 [ 192.596820][T15549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 192.604800][T15549] R13: 000000000000006e R14: 00007ff02de92050 R15: 00007ffc12b72038 [ 192.612782][T15549] 15:49:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x7400], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x7a00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:40 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x2010000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:40 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x18e}}) [ 192.615905][T15549] kobject: kobject_add_internal failed for syztnl1 (error: -12 parent: net) [ 192.634786][T15553] loop1: detected capacity change from 0 to 256 15:49:40 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) (fail_nth: 12) 15:49:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x8602], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:40 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f0d17723159662803c456062c6e6f646f7473"], 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") (async) r0 = accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000140)={0x60000005}) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6488, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x8e01], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:40 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x1b2}}) 15:49:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6500, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 192.698910][T15564] loop1: detected capacity change from 0 to 256 [ 192.722628][T15566] loop4: detected capacity change from 0 to 256 15:49:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x9600], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6558, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:40 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r1, 0x40049366, &(0x7f0000000140)=0x1) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfd14) write$cgroup_int(r2, &(0x7f0000000140), 0x12) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r3, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x18) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) r7 = perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x3, 0x5, 0x1f, 0x1, 0x0, 0x4, 0xc0204, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000280), 0xb}, 0x5f1df80c7f322137, 0x1, 0x81, 0x0, 0xffffffffffffffd8, 0x3, 0x3ff, 0x0, 0x10001, 0x0, 0xda7}, r1, 0x3, r1, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000380)={0x5, 0x0, &(0x7f0000000340)=[r0, r3, r0, r0, r4, r5, r6, r0, r1, r7]}, 0xa) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/fib_triestat\x00') [ 192.793205][T15587] FAULT_INJECTION: forcing a failure. [ 192.793205][T15587] name failslab, interval 1, probability 0, space 0, times 0 [ 192.806141][T15587] CPU: 0 PID: 15587 Comm: syz-executor.5 Not tainted 6.6.0-rc4-syzkaller-00284-gb9ddbb0cde2a #0 [ 192.816623][T15587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 192.826803][T15587] Call Trace: [ 192.828638][T15589] loop4: detected capacity change from 0 to 256 [ 192.830086][T15587] [ 192.839339][T15587] dump_stack_lvl+0xda/0x130 [ 192.843968][T15587] dump_stack+0x15/0x20 [ 192.848162][T15587] should_fail_ex+0x21f/0x230 [ 192.852867][T15587] __should_failslab+0x92/0xa0 [ 192.857722][T15587] should_failslab+0x9/0x20 [ 192.862233][T15587] slab_pre_alloc_hook+0x38/0x180 [ 192.867299][T15587] kmem_cache_alloc+0x52/0x220 [ 192.872068][T15587] ? __kernfs_new_node+0x6a/0x380 [ 192.877119][T15587] __kernfs_new_node+0x6a/0x380 [ 192.882046][T15587] ? kernfs_add_one+0x330/0x390 [ 192.886935][T15587] kernfs_new_node+0x5f/0xd0 [ 192.891566][T15587] __kernfs_create_file+0x49/0x180 [ 192.896701][T15587] ? dev_attr_show+0x90/0x90 [ 192.901300][T15587] sysfs_add_file_mode_ns+0x136/0x1b0 [ 192.906695][T15587] sysfs_create_file_ns+0xd0/0x110 [ 192.911920][T15587] device_add+0x3ef/0x8b0 [ 192.916260][T15587] netdev_register_kobject+0xfc/0x230 [ 192.921652][T15587] register_netdevice+0x650/0xb20 [ 192.926732][T15587] ip6gre_tunnel_locate+0x1c9/0x490 [ 192.931946][T15587] ? should_fail_ex+0xd1/0x230 [ 192.936721][T15587] ip6gre_tunnel_siocdevprivate+0x8ea/0xa60 [ 192.942698][T15587] ? ip6gre_tunnel_init+0x100/0x100 [ 192.947926][T15587] dev_ifsioc+0x82f/0x9e0 [ 192.952294][T15587] dev_ioctl+0x8d8/0xa90 [ 192.956553][T15587] sock_ioctl+0x5aa/0x630 [ 192.960951][T15587] ? sock_poll+0x260/0x260 [ 192.965376][T15587] __se_sys_ioctl+0xcf/0x140 [ 192.970065][T15587] __x64_sys_ioctl+0x43/0x50 [ 192.974666][T15587] do_syscall_64+0x41/0xc0 [ 192.979183][T15587] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 192.985167][T15587] RIP: 0033:0x7ff02dd72ae9 [ 192.989590][T15587] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 193.009254][T15587] RSP: 002b:00007ff02d0d40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 193.017674][T15587] RAX: ffffffffffffffda RBX: 00007ff02de92050 RCX: 00007ff02dd72ae9 [ 193.025651][T15587] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000003 [ 193.033626][T15587] RBP: 00007ff02d0d4120 R08: 0000000000000000 R09: 0000000000000000 15:49:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x9800], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6600, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 193.041680][T15587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 193.049655][T15587] R13: 000000000000006e R14: 00007ff02de92050 R15: 00007ffc12b72038 [ 193.057704][T15587] 15:49:40 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) (fail_nth: 13) 15:49:40 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x2200000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6800, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:40 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x1d2}}) 15:49:40 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (rerun: 32) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r1, 0x40049366, &(0x7f0000000140)=0x1) (async) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) (async, rerun: 64) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfd14) (rerun: 64) write$cgroup_int(r2, &(0x7f0000000140), 0x12) (async, rerun: 32) r3 = socket$rds(0x15, 0x5, 0x0) (rerun: 32) bind$rds(r3, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r3, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x18) (async) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) (async) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) (async) sendmsg$rds(r6, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) r7 = perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x3, 0x5, 0x1f, 0x1, 0x0, 0x4, 0xc0204, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000280), 0xb}, 0x5f1df80c7f322137, 0x1, 0x81, 0x0, 0xffffffffffffffd8, 0x3, 0x3ff, 0x0, 0x10001, 0x0, 0xda7}, r1, 0x3, r1, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000380)={0x5, 0x0, &(0x7f0000000340)=[r0, r3, r0, r0, r4, r5, r6, r0, r1, r7]}, 0xa) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/fib_triestat\x00') 15:49:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x9c03], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x9e00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 193.168398][T15603] loop1: detected capacity change from 0 to 256 15:49:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6900, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:41 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x2500000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xaa00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 193.212086][T15610] loop4: detected capacity change from 0 to 256 15:49:41 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x21a}}) 15:49:41 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xc100], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6a00, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:41 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x3f00000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:41 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r1, 0x40049366, &(0x7f0000000140)=0x1) (async) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) (async) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfd14) (async) write$cgroup_int(r2, &(0x7f0000000140), 0x12) (async) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r3, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x18) (async) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) (async) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) r7 = perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x3, 0x5, 0x1f, 0x1, 0x0, 0x4, 0xc0204, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000280), 0xb}, 0x5f1df80c7f322137, 0x1, 0x81, 0x0, 0xffffffffffffffd8, 0x3, 0x3ff, 0x0, 0x10001, 0x0, 0xda7}, r1, 0x3, r1, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000380)={0x5, 0x0, &(0x7f0000000340)=[r0, r3, r0, r0, r4, r5, r6, r0, r1, r7]}, 0xa) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/fib_triestat\x00') 15:49:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xca00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 193.263689][T15622] loop1: detected capacity change from 0 to 256 15:49:41 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x29c}}) 15:49:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xd001], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:41 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x4000000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6c00, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 193.328302][T15635] loop1: detected capacity change from 0 to 256 [ 193.365889][ T4131] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 15:49:41 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x2b8}}) 15:49:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xd201], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 193.412248][T15647] loop4: detected capacity change from 0 to 256 15:49:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6d00, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:41 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7fffffffffffffff}}, './file0\x00'}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x20010, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:41 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:41 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x5000000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xd702], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 193.461551][T15663] loop1: detected capacity change from 0 to 256 15:49:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x7000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:41 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (rerun: 64) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7fffffffffffffff}}, './file0\x00'}) (async, rerun: 32) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x20010, r1, 0x0) (async, rerun: 32) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xd900], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:41 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4b47, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:41 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x2e4}}) [ 193.530369][T15676] loop4: detected capacity change from 0 to 256 [ 193.556198][T15677] loop1: detected capacity change from 0 to 256 15:49:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x7100, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:41 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x8cffffff00000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 193.605869][T15685] loop4: detected capacity change from 0 to 256 15:49:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x7200, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xe402], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 193.648436][T15696] loop1: detected capacity change from 0 to 256 15:49:41 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x300}}) 15:49:41 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4b49, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x7400, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:41 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0xe5ffffff00000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 193.692407][T15685] loop4: detected capacity change from 0 to 256 [ 193.758674][T15685] loop4: detected capacity change from 0 to 256 [ 193.761313][T15714] loop1: detected capacity change from 0 to 256 [ 193.788395][T15685] loop4: detected capacity change from 0 to 256 [ 193.827060][T15685] loop4: detected capacity change from 0 to 256 [ 193.841365][T15685] loop4: detected capacity change from 0 to 256 [ 193.852438][T15685] loop4: detected capacity change from 0 to 256 [ 193.863598][T15685] loop4: detected capacity change from 0 to 256 [ 193.874111][T15685] loop4: detected capacity change from 0 to 256 [ 193.888624][T15685] loop4: detected capacity change from 0 to 256 [ 193.899279][T15685] loop4: detected capacity change from 0 to 256 [ 193.909846][T15685] loop4: detected capacity change from 0 to 256 [ 193.923883][T15685] loop4: detected capacity change from 0 to 256 [ 193.935721][T15685] loop4: detected capacity change from 0 to 256 [ 193.949278][T15685] loop4: detected capacity change from 0 to 256 [ 193.958329][T15685] loop4: detected capacity change from 0 to 256 [ 193.967463][T15685] loop4: detected capacity change from 0 to 256 [ 193.978854][T15685] loop4: detected capacity change from 0 to 256 [ 194.014993][ T3425] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 194.016425][T15685] loop4: detected capacity change from 0 to 256 [ 194.024547][ T3425] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 194.040023][ T3425] Buffer I/O error on dev loop4, logical block 0, async page read [ 194.057837][T15685] loop4: detected capacity change from 0 to 256 [ 194.068251][T15685] loop4: detected capacity change from 0 to 256 [ 194.080020][T15685] loop4: detected capacity change from 0 to 256 [ 194.093009][T15685] loop4: detected capacity change from 0 to 256 [ 194.103627][T15685] loop4: detected capacity change from 0 to 256 [ 194.117854][T15685] loop4: detected capacity change from 0 to 256 15:49:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x7500, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:42 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7fffffffffffffff}}, './file0\x00'}) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x20010, r1, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0xf0ffffff00000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:42 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x39c}}) 15:49:42 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x541b, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xe812], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 194.128234][T15685] loop4: detected capacity change from 0 to 256 [ 194.138695][T15685] loop4: detected capacity change from 0 to 256 [ 194.149568][T15685] loop4: detected capacity change from 0 to 256 [ 194.160255][T15685] loop4: detected capacity change from 0 to 256 [ 194.171119][T15685] loop4: detected capacity change from 0 to 256 15:49:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x7600, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xec00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0xf6ffffff00000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x7800, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:42 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5421, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 194.200556][T15720] loop1: detected capacity change from 0 to 256 [ 194.233521][T15729] loop4: detected capacity change from 0 to 256 15:49:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./bus\x00', 0x200040, &(0x7f0000000140)={[{@fat=@nfs_nostale_ro}, {@fat=@tz_utc}, {@fat=@discard}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x8) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xec02], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x500}}) 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xfc00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0xf9fdffff00000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 194.311901][T15744] loop1: detected capacity change from 0 to 256 15:49:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x7900, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 194.352244][T15753] loop4: detected capacity change from 0 to 256 15:49:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./bus\x00', 0x200040, &(0x7f0000000140)={[{@fat=@nfs_nostale_ro}, {@fat=@tz_utc}, {@fat=@discard}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x8) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./bus\x00', 0x200040, &(0x7f0000000140)={[{@fat=@nfs_nostale_ro}, {@fat=@tz_utc}, {@fat=@discard}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) creat(&(0x7f0000000100)='./bus\x00', 0x0) (async) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x8) (async) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) (async) 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x28f5c], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5450, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x7a00, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0xfeffffff00000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 194.400131][T15762] loop1: detected capacity change from 0 to 256 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x40000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x600}}) 15:49:42 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5451, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x7b1f, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x1000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 194.469935][T15774] loop4: detected capacity change from 0 to 256 [ 194.478657][T15772] loop1: detected capacity change from 0 to 256 15:49:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0xff03000000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./bus\x00', 0x200040, &(0x7f0000000140)={[{@fat=@nfs_nostale_ro}, {@fat=@tz_utc}, {@fat=@discard}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x8) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./bus\x00', 0x200040, &(0x7f0000000140)={[{@fat=@nfs_nostale_ro}, {@fat=@tz_utc}, {@fat=@discard}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) creat(&(0x7f0000000100)='./bus\x00', 0x0) (async) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x8) (async) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) (async) 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x2000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x700}}) 15:49:42 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5452, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x8035, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x3000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0xfff7ffff00000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 194.579962][T15794] loop1: detected capacity change from 0 to 256 [ 194.598147][T15798] loop4: detected capacity change from 0 to 256 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x4000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:42 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x900}}) 15:49:42 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5460, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x5000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x8847, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0xffff030000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 194.689559][T15813] loop1: detected capacity change from 0 to 256 [ 194.729089][T15822] loop4: detected capacity change from 0 to 256 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x6000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x8848, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 194.752408][T15827] xt_ct_set_timeout: 50 callbacks suppressed [ 194.752440][T15827] xt_CT: You must specify a L4 protocol and not use inversions on it 15:49:42 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xa00}}) 15:49:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:42 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8910, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0xffff1f0000000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x7000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 194.776476][ T27] audit: type=1400 audit(1696780182.615:287): avc: denied { write } for pid=15817 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 194.812975][T15833] loop1: detected capacity change from 0 to 256 [ 194.823611][T15836] xt_CT: You must specify a L4 protocol and not use inversions on it [ 194.823837][T15835] selinux_netlink_send: 24 callbacks suppressed [ 194.823848][T15835] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15835 comm=syz-executor.2 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x8000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8911, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x8864, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0xffffff0f00000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 194.867120][T15839] loop4: detected capacity change from 0 to 256 [ 194.886743][T15846] xt_CT: You must specify a L4 protocol and not use inversions on it [ 194.890605][T15848] loop1: detected capacity change from 0 to 256 15:49:42 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xad9}}) 15:49:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x9000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x8902, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 194.945978][T15852] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15852 comm=syz-executor.2 [ 194.956738][T15854] xt_CT: You must specify a L4 protocol and not use inversions on it [ 194.971843][T15858] loop1: detected capacity change from 0 to 256 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xa000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0xffffff7f00000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:42 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8913, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:42 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xaff}}) [ 195.005651][T15861] xt_CT: You must specify a L4 protocol and not use inversions on it [ 195.023648][T15865] loop4: detected capacity change from 0 to 256 15:49:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xb000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f732c63686520e6b905c3a1a7636b3d726500"/29], 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2989578656"], 0x81) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x20) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, r0, 0x265cc000) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x54, 0x0, 0x7, 0x201, 0x0, 0x0, {0xa, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x9b}, @NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7fffffff}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x6}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1f}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3554}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4009000}, 0x4000049) [ 195.055065][T15869] xt_CT: You must specify a L4 protocol and not use inversions on it [ 195.064471][T15874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15874 comm=syz-executor.2 [ 195.080386][T15877] loop1: detected capacity change from 0 to 256 15:49:42 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:43 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xb00}}) 15:49:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x8906, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xc000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 195.124983][T15885] loop4: detected capacity change from 0 to 256 [ 195.127261][T15886] xt_CT: You must specify a L4 protocol and not use inversions on it [ 195.132254][T15885] FAT-fs (loop4): Unrecognized mount option "nos" or missing value 15:49:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0xffffffff00000000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xd000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f732c63686520e6b905c3a1a7636b3d726500"/29], 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2989578656"], 0x81) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x20) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, r0, 0x265cc000) (async) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x54, 0x0, 0x7, 0x201, 0x0, 0x0, {0xa, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x9b}, @NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7fffffff}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x6}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1f}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3554}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4009000}, 0x4000049) [ 195.204722][T15894] xt_CT: You must specify a L4 protocol and not use inversions on it [ 195.238440][T15899] xt_CT: You must specify a L4 protocol and not use inversions on it [ 195.255898][T15900] loop1: detected capacity change from 0 to 256 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xe000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x2, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x10000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x11000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 195.284032][T15903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15903 comm=syz-executor.2 [ 195.302897][T15906] loop4: detected capacity change from 0 to 256 15:49:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f732c63686520e6b905c3a1a7636b3d726500"/29], 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2989578656"], 0x81) (async) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x20) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, r0, 0x265cc000) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x54, 0x0, 0x7, 0x201, 0x0, 0x0, {0xa, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x9b}, @NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7fffffff}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x6}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1f}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3554}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4009000}, 0x4000049) 15:49:43 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891d, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:43 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xc00}}) 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x12000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x892f, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x3, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:43 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891e, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 195.318019][T15908] xt_CT: You must specify a L4 protocol and not use inversions on it [ 195.429911][T15919] loop1: detected capacity change from 0 to 256 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x13020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async, rerun: 32) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async, rerun: 32) mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xc306, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 195.495375][T15930] loop4: detected capacity change from 0 to 256 [ 195.509096][T15932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15932 comm=syz-executor.2 [ 195.526519][T15935] loop1: detected capacity change from 0 to 256 15:49:43 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891f, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x16000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 195.561234][T15942] loop4: detected capacity change from 0 to 256 15:49:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x4, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 195.602336][T15948] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15948 comm=syz-executor.2 15:49:43 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xd00}}) 15:49:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x25000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:43 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8920, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 195.661043][T15959] loop1: detected capacity change from 0 to 256 15:49:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x5, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x25010000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 195.699294][T15964] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15964 comm=syz-executor.2 [ 195.712102][T15967] loop4: detected capacity change from 0 to 256 15:49:43 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8921, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:43 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xe00}}) 15:49:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x400300, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 195.773459][T15977] loop1: detected capacity change from 0 to 256 [ 195.792981][T15979] loop4: detected capacity change from 0 to 256 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x38010000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x3a020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 195.814615][T15986] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15986 comm=syz-executor.2 15:49:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xe0ffff, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:43 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x1100}}) 15:49:43 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8922, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x6, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x3e030000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:43 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x1200}}) 15:49:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 195.902544][T15998] loop4: detected capacity change from 0 to 256 [ 195.914213][T16001] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16001 comm=syz-executor.2 [ 195.942598][T16010] loop1: detected capacity change from 0 to 256 15:49:43 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x7, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x48000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fc086d3cc"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:43 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8924, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 196.013953][T16020] loop4: detected capacity change from 0 to 256 [ 196.021329][T16018] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16018 comm=syz-executor.2 [ 196.024058][T16023] loop1: detected capacity change from 0 to 256 15:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x48020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x3000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:43 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x1a02}}) 15:49:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x8, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x4c000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fc086d3cc"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 196.118914][T16034] loop4: detected capacity change from 0 to 256 [ 196.156944][T16043] loop1: detected capacity change from 0 to 256 15:49:44 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x2000}}) 15:49:44 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x4d000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x9, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x5a030000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:44 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fc086d3cc"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fc086d3cc"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x2400}}) 15:49:44 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8929, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x5c8f0200], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xa, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 196.283638][T16068] loop1: detected capacity change from 0 to 256 [ 196.322484][T16075] loop4: detected capacity change from 0 to 256 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x8000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:44 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x2501}}) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x60020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x8060000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8930, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:44 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x65030000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 196.401567][T16089] loop1: detected capacity change from 0 to 256 15:49:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xb, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:44 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x2a00}}) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x68000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8) (async) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:44 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8931, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x6c000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xa000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 196.523790][T16114] loop1: detected capacity change from 0 to 256 15:49:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xc, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xb000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x71010000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:44 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8932, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:44 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000b80)={0x0, 0x5, 0x1, [0xb93, 0xff, 0x23, 0x2, 0x100], [0xfffffffffffffff8, 0x8001, 0x1, 0x8, 0x80, 0x10001, 0x400, 0x1, 0x6, 0x81, 0x8489, 0x8, 0x3, 0x7a, 0x7ff, 0x20, 0x8, 0x3, 0x4, 0x3, 0x1, 0x80000001, 0x4, 0x8000, 0x2ea3, 0x8, 0x5, 0x9246, 0x40, 0x400, 0x400000000000000, 0x5, 0x6, 0x1, 0x9, 0x100000001, 0x6, 0x800, 0xc7, 0x5, 0x200, 0x9, 0x7, 0x4, 0xe00, 0x7, 0x4, 0x0, 0xfffffffffffffc00, 0x6, 0x1ff, 0x7, 0xd13660, 0x800, 0x40, 0x6, 0x7fff, 0x8, 0x3ff, 0xffffffffffffffff, 0x5, 0x101, 0x1, 0xe9e, 0x3, 0x9, 0x7fff, 0x100, 0x2, 0x6, 0x6d6, 0x421, 0x229, 0x0, 0x9, 0x3, 0x1, 0x1, 0x1f, 0x3, 0xd94, 0x5, 0xd7, 0x101, 0x6, 0x9, 0xd3, 0x40, 0xb45, 0x1, 0x1cf1, 0xff, 0x6, 0x8001, 0x3, 0x0, 0x2785, 0x0, 0x9, 0x200, 0x8, 0x4e34, 0x80000000, 0xa3f, 0x3, 0x8, 0x0, 0x7, 0x7, 0x7ff, 0x80000000, 0x81, 0x80, 0x8000000000000001, 0x85, 0x0, 0x6, 0x81, 0x5, 0x7ff, 0x449c]}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000008fdff00000018000380140003801000018004000300080001"], 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x44, r4, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x8, 0x4, '\x00\x00\x00\x00'}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x34, r4, 0x10, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_COALESCE_TX_MAX_FRAMES_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES={0x8}, @ETHTOOL_A_COALESCE_TX_USECS_HIGH={0x8, 0x15, 0x4}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES_HIGH={0x8, 0x16, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008000}, 0x801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 15:49:44 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x2f00}}) 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xc000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x74000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xd, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 196.651056][T16140] loop1: detected capacity change from 0 to 256 [ 196.680219][T16146] loop4: detected capacity change from 0 to 256 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xd000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000b80)={0x0, 0x5, 0x1, [0xb93, 0xff, 0x23, 0x2, 0x100], [0xfffffffffffffff8, 0x8001, 0x1, 0x8, 0x80, 0x10001, 0x400, 0x1, 0x6, 0x81, 0x8489, 0x8, 0x3, 0x7a, 0x7ff, 0x20, 0x8, 0x3, 0x4, 0x3, 0x1, 0x80000001, 0x4, 0x8000, 0x2ea3, 0x8, 0x5, 0x9246, 0x40, 0x400, 0x400000000000000, 0x5, 0x6, 0x1, 0x9, 0x100000001, 0x6, 0x800, 0xc7, 0x5, 0x200, 0x9, 0x7, 0x4, 0xe00, 0x7, 0x4, 0x0, 0xfffffffffffffc00, 0x6, 0x1ff, 0x7, 0xd13660, 0x800, 0x40, 0x6, 0x7fff, 0x8, 0x3ff, 0xffffffffffffffff, 0x5, 0x101, 0x1, 0xe9e, 0x3, 0x9, 0x7fff, 0x100, 0x2, 0x6, 0x6d6, 0x421, 0x229, 0x0, 0x9, 0x3, 0x1, 0x1, 0x1f, 0x3, 0xd94, 0x5, 0xd7, 0x101, 0x6, 0x9, 0xd3, 0x40, 0xb45, 0x1, 0x1cf1, 0xff, 0x6, 0x8001, 0x3, 0x0, 0x2785, 0x0, 0x9, 0x200, 0x8, 0x4e34, 0x80000000, 0xa3f, 0x3, 0x8, 0x0, 0x7, 0x7, 0x7ff, 0x80000000, 0x81, 0x80, 0x8000000000000001, 0x85, 0x0, 0x6, 0x81, 0x5, 0x7ff, 0x449c]}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000008fdff00000018000380140003801000018004000300080001"], 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x44, r4, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x8, 0x4, '\x00\x00\x00\x00'}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x34, r4, 0x10, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_COALESCE_TX_MAX_FRAMES_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES={0x8}, @ETHTOOL_A_COALESCE_TX_USECS_HIGH={0x8, 0x15, 0x4}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES_HIGH={0x8, 0x16, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008000}, 0x801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000b80)={0x0, 0x5, 0x1, [0xb93, 0xff, 0x23, 0x2, 0x100], [0xfffffffffffffff8, 0x8001, 0x1, 0x8, 0x80, 0x10001, 0x400, 0x1, 0x6, 0x81, 0x8489, 0x8, 0x3, 0x7a, 0x7ff, 0x20, 0x8, 0x3, 0x4, 0x3, 0x1, 0x80000001, 0x4, 0x8000, 0x2ea3, 0x8, 0x5, 0x9246, 0x40, 0x400, 0x400000000000000, 0x5, 0x6, 0x1, 0x9, 0x100000001, 0x6, 0x800, 0xc7, 0x5, 0x200, 0x9, 0x7, 0x4, 0xe00, 0x7, 0x4, 0x0, 0xfffffffffffffc00, 0x6, 0x1ff, 0x7, 0xd13660, 0x800, 0x40, 0x6, 0x7fff, 0x8, 0x3ff, 0xffffffffffffffff, 0x5, 0x101, 0x1, 0xe9e, 0x3, 0x9, 0x7fff, 0x100, 0x2, 0x6, 0x6d6, 0x421, 0x229, 0x0, 0x9, 0x3, 0x1, 0x1, 0x1f, 0x3, 0xd94, 0x5, 0xd7, 0x101, 0x6, 0x9, 0xd3, 0x40, 0xb45, 0x1, 0x1cf1, 0xff, 0x6, 0x8001, 0x3, 0x0, 0x2785, 0x0, 0x9, 0x200, 0x8, 0x4e34, 0x80000000, 0xa3f, 0x3, 0x8, 0x0, 0x7, 0x7, 0x7ff, 0x80000000, 0x81, 0x80, 0x8000000000000001, 0x85, 0x0, 0x6, 0x81, 0x5, 0x7ff, 0x449c]}) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) close(r2) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) (async) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000008fdff00000018000380140003801000018004000300080001"], 0x44}}, 0x0) (async) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x44, r4, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x8, 0x4, '\x00\x00\x00\x00'}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x44}}, 0x0) (async) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x34, r4, 0x10, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_COALESCE_TX_MAX_FRAMES_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES={0x8}, @ETHTOOL_A_COALESCE_TX_USECS_HIGH={0x8, 0x15, 0x4}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES_HIGH={0x8, 0x16, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008000}, 0x801) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x7a000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:44 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8933, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xe000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x3a00}}) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x86020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xe, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 196.788404][T16165] loop1: detected capacity change from 0 to 256 [ 196.814009][T16171] loop4: detected capacity change from 0 to 256 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xf000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x8e010000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:44 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8937, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:44 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000b80)={0x0, 0x5, 0x1, [0xb93, 0xff, 0x23, 0x2, 0x100], [0xfffffffffffffff8, 0x8001, 0x1, 0x8, 0x80, 0x10001, 0x400, 0x1, 0x6, 0x81, 0x8489, 0x8, 0x3, 0x7a, 0x7ff, 0x20, 0x8, 0x3, 0x4, 0x3, 0x1, 0x80000001, 0x4, 0x8000, 0x2ea3, 0x8, 0x5, 0x9246, 0x40, 0x400, 0x400000000000000, 0x5, 0x6, 0x1, 0x9, 0x100000001, 0x6, 0x800, 0xc7, 0x5, 0x200, 0x9, 0x7, 0x4, 0xe00, 0x7, 0x4, 0x0, 0xfffffffffffffc00, 0x6, 0x1ff, 0x7, 0xd13660, 0x800, 0x40, 0x6, 0x7fff, 0x8, 0x3ff, 0xffffffffffffffff, 0x5, 0x101, 0x1, 0xe9e, 0x3, 0x9, 0x7fff, 0x100, 0x2, 0x6, 0x6d6, 0x421, 0x229, 0x0, 0x9, 0x3, 0x1, 0x1, 0x1f, 0x3, 0xd94, 0x5, 0xd7, 0x101, 0x6, 0x9, 0xd3, 0x40, 0xb45, 0x1, 0x1cf1, 0xff, 0x6, 0x8001, 0x3, 0x0, 0x2785, 0x0, 0x9, 0x200, 0x8, 0x4e34, 0x80000000, 0xa3f, 0x3, 0x8, 0x0, 0x7, 0x7, 0x7ff, 0x80000000, 0x81, 0x80, 0x8000000000000001, 0x85, 0x0, 0x6, 0x81, 0x5, 0x7ff, 0x449c]}) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) close(r2) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000008fdff00000018000380140003801000018004000300080001"], 0x44}}, 0x0) (async) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x44, r4, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x8, 0x4, '\x00\x00\x00\x00'}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x44}}, 0x0) (async) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x34, r4, 0x10, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_COALESCE_TX_MAX_FRAMES_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES={0x8}, @ETHTOOL_A_COALESCE_TX_USECS_HIGH={0x8, 0x15, 0x4}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES_HIGH={0x8, 0x16, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008000}, 0x801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x10000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x96000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:44 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8942, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 196.927389][T16189] loop1: detected capacity change from 0 to 256 15:49:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xf, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x11000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x3f00}}) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x98000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 196.991772][T16203] loop4: detected capacity change from 0 to 256 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x12000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x9c030000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 197.035632][T16212] loop1: detected capacity change from 0 to 256 15:49:44 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x4000}}) 15:49:44 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8943, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:44 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x48, r3, 0x4, 0x0, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xfffffffffffffffe}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x48}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_KEY(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x5c, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8004}, 0x810) 15:49:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x10, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x13000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x9e000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:45 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x14000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 197.140769][T16234] loop4: detected capacity change from 0 to 256 [ 197.164114][T16238] loop1: detected capacity change from 0 to 256 15:49:45 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x4800}}) 15:49:45 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x48, r3, 0x4, 0x0, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xfffffffffffffffe}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x48}}, 0x0) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_KEY(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x5c, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8004}, 0x810) 15:49:45 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x11, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xaa000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x15000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xc1000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:45 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x16000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:45 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x4a00}}) 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xca000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 197.282457][T16260] loop1: detected capacity change from 0 to 256 [ 197.289064][T16258] loop4: detected capacity change from 0 to 256 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x18000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:45 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async, rerun: 64) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (rerun: 64) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x48, r3, 0x4, 0x0, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xfffffffffffffffe}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x48}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_KEY(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x5c, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8004}, 0x810) 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xd0010000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:45 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x12, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x19000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:45 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8948, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:45 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x4c00}}) 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xd2010000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 197.418030][T16287] loop4: detected capacity change from 0 to 256 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x1a000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:45 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8949, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 197.486413][T16299] loop1: detected capacity change from 0 to 256 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x1c000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xd7020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:45 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x13, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:45 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x4d00}}) 15:49:45 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000140)={[{@nodots}, {@fat=@discard}, {@dots}]}, 0x3, 0x18c, &(0x7f00000003c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2321202e2f66696c6530206367726f75702e636f6e74726f6c6c6572730020242020235b2064697363617264206e6f646f74730adafb40e86806da5e020650e3cb00b625f0b1c75450036cf1ee535681575fe513591a65cc32928128a1b331585d8005b504bf915842a35521131ec6d6d0b916a4ac8311d52b52480c80307f70f92cbafb99909712ebaf89c4d18092bc580bafce2524c0cf782ab0da3a414cec906c397a22489261decf37477b058785fadacbb427"], 0xb5) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000cc0)='-!\x00') bind$rds(r2, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r2, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @random}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6, @link_local}, 0x10) sendmmsg$inet(r2, &(0x7f0000000c00)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)="36ebcc85e56abb9d87c93ace500913fa3165f1079594cdb602be6de168d519b5ef75ef25e51537b1d00451fd6ba24df449cd1d4b2b18dc98632de256954330962ec5f82c127ad91a855dc6dd0cb131f942ce010364a0ea081f47ca497f9c29e1427f22f1964a65eb562a6e8a482b9316ce34e98435327009b116f465fa2083f335c7efb8e59f834408ee03a4577b7c8641", 0x91}, {&(0x7f0000000240)="7652c0b6ef86a2bcb5c1ff9c3f3a472083e0ba3323dcd857462190be1aa88c", 0x1f}, {&(0x7f0000000580)="c7bf0f0000c18006bce55275701a851095722e132db484c3a48598ea8a6cdc4a0f5c5bf7fb72c42e02e07d95249c3cc3758c35f6279a1b10d28c9e821a80be84fc3a9a56fdb2525476c3bd2a00512f7a4820e429aed919be86f3eb11c467fd43d61456eb94dd111310f421fece553ee7f080542ce868de79c3facc91f939a4af9b4742d514ab3e2b", 0x88}, {&(0x7f0000000380)="f31a3a81e783a85eadcd40c2815b180b646eadf651a06ef776583675c3ccd3570d", 0x21}, {&(0x7f0000000640)="9a6c8f442c1885f0910e73b3ab34d813ff76b347a7fd5e225b82111e53de88e8de1ac8988d44efa4c288f3022895a5b6324506929145928c9edb2b14b05f1b1bebf5068970eb6bc9770d22f1b056f17fb46db014e4204de2afe285bba7e322c2b2f2f1580fe7db8a", 0x68}, {&(0x7f00000006c0)="2150e0398dd3fd0c4e682284f58b7b5e23843a2c679b9146692caa51506e9b1f0ad8bbc8d1aeb8f8985a8966adf0e54a6162545efff0d4720c974b81c740effc50edeadb3b388eb79dff2673a8edfa86c7e6e4f36c41331a9a5b0d94be9ae11a38146d50336a70fed211f11408c134c502c56d8cdc00ebda1fb4c04314624581ceb1f6ed2c7f89bb94533483b4af139203d7ea5318b2ef28383144a94089bdfd384814", 0xa3}, {&(0x7f0000000780)="506f4eb20e805b0947fde8a3d019ed4bb146b798a46901704fcbdf3b9e0aa1c4777df57be4d933d559b6b9fa55a8208f4cca64596f52", 0x36}], 0x7, &(0x7f0000000840)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x16}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x98}}, {{&(0x7f0000000900)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10, &(0x7f00000009c0)=[{&(0x7f0000000940)="0d7aff7211bc7a33a4b17e275181cd0ce96012500bda5952f83fa98ce2dcd571b1d0873eaffff2ed5ea6e7c6afe4730c58cb8884254171c1086febd1abbccbcbb4ab364c7393715252c13d7b9d8e1196cd", 0x51}], 0x1, &(0x7f0000000a00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x92}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x74, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0xce, [@multicast2, @multicast2, @loopback, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x2e}]}, @ssrr={0x89, 0x1b, 0xb8, [@empty, @remote, @rand_addr=0x64010102, @broadcast, @local, @dev={0xac, 0x14, 0x14, 0xf}]}, @generic={0x89, 0x9, "1aedf91e03148e"}, @ra={0x94, 0x4}, @noop, @generic={0x1bb, 0x6, "41bd8fe5"}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x13, 0xf6, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @broadcast]}]}}}, @ip_retopts={{0xa4, 0x0, 0x7, {[@cipso={0x86, 0x50, 0x0, [{0x6, 0x3, "14"}, {0x0, 0x4, "19a4"}, {0x1, 0x10, "f91e18aa9840e49919db9e266dd9"}, {0x2, 0x3, "d7"}, {0x7, 0x10, "f3163cf7c0f5bf947f6ac36aa7d6"}, {0x5, 0x10, "5ae8e24e5d28469152fa9543e8de"}, {0x0, 0x10, "aa9617ab7eba5ccfc207bbbce71e"}]}, @timestamp={0x44, 0x8, 0xde, 0x0, 0x4, [0x1]}, @noop, @timestamp={0x44, 0x18, 0x75, 0x0, 0xb, [0x6, 0x5, 0x7, 0xffffffe4, 0x0]}, @timestamp={0x44, 0xc, 0x38, 0x0, 0x2, [0x20, 0x0]}, @noop, @generic={0xb, 0xc, "e622b4e7a39f7be0022a"}, @lsrr={0x83, 0x7, 0xac, [@empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3f72}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast1, @multicast2}}}], 0x1d0}}], 0x2, 0x4000) write$binfmt_misc(r0, &(0x7f0000000c80)=ANY=[@ANYBLOB="bbe7fd2bb93749cab31f316e2e56"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x1d000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:45 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x894a, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xd9000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 197.606934][T16321] loop4: detected capacity change from 0 to 256 [ 197.628513][T16323] loop1: detected capacity change from 0 to 256 [ 197.638503][T16321] batadv_slave_0: entered promiscuous mode 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xe4020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:45 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x6800}}) 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x1e000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:45 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x22, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xe8120000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 197.660113][T16321] batadv0: entered promiscuous mode [ 197.680026][T16318] batadv0: left promiscuous mode [ 197.685222][T16318] batadv_slave_0: left promiscuous mode 15:49:45 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000140)={[{@nodots}, {@fat=@discard}, {@dots}]}, 0x3, 0x18c, &(0x7f00000003c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2321202e2f66696c6530206367726f75702e636f6e74726f6c6c6572730020242020235b2064697363617264206e6f646f74730adafb40e86806da5e020650e3cb00b625f0b1c75450036cf1ee535681575fe513591a65cc32928128a1b331585d8005b504bf915842a35521131ec6d6d0b916a4ac8311d52b52480c80307f70f92cbafb99909712ebaf89c4d18092bc580bafce2524c0cf782ab0da3a414cec906c397a22489261decf37477b058785fadacbb427"], 0xb5) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000cc0)='-!\x00') bind$rds(r2, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r2, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @random}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6, @link_local}, 0x10) sendmmsg$inet(r2, &(0x7f0000000c00)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)="36ebcc85e56abb9d87c93ace500913fa3165f1079594cdb602be6de168d519b5ef75ef25e51537b1d00451fd6ba24df449cd1d4b2b18dc98632de256954330962ec5f82c127ad91a855dc6dd0cb131f942ce010364a0ea081f47ca497f9c29e1427f22f1964a65eb562a6e8a482b9316ce34e98435327009b116f465fa2083f335c7efb8e59f834408ee03a4577b7c8641", 0x91}, {&(0x7f0000000240)="7652c0b6ef86a2bcb5c1ff9c3f3a472083e0ba3323dcd857462190be1aa88c", 0x1f}, {&(0x7f0000000580)="c7bf0f0000c18006bce55275701a851095722e132db484c3a48598ea8a6cdc4a0f5c5bf7fb72c42e02e07d95249c3cc3758c35f6279a1b10d28c9e821a80be84fc3a9a56fdb2525476c3bd2a00512f7a4820e429aed919be86f3eb11c467fd43d61456eb94dd111310f421fece553ee7f080542ce868de79c3facc91f939a4af9b4742d514ab3e2b", 0x88}, {&(0x7f0000000380)="f31a3a81e783a85eadcd40c2815b180b646eadf651a06ef776583675c3ccd3570d", 0x21}, {&(0x7f0000000640)="9a6c8f442c1885f0910e73b3ab34d813ff76b347a7fd5e225b82111e53de88e8de1ac8988d44efa4c288f3022895a5b6324506929145928c9edb2b14b05f1b1bebf5068970eb6bc9770d22f1b056f17fb46db014e4204de2afe285bba7e322c2b2f2f1580fe7db8a", 0x68}, {&(0x7f00000006c0)="2150e0398dd3fd0c4e682284f58b7b5e23843a2c679b9146692caa51506e9b1f0ad8bbc8d1aeb8f8985a8966adf0e54a6162545efff0d4720c974b81c740effc50edeadb3b388eb79dff2673a8edfa86c7e6e4f36c41331a9a5b0d94be9ae11a38146d50336a70fed211f11408c134c502c56d8cdc00ebda1fb4c04314624581ceb1f6ed2c7f89bb94533483b4af139203d7ea5318b2ef28383144a94089bdfd384814", 0xa3}, {&(0x7f0000000780)="506f4eb20e805b0947fde8a3d019ed4bb146b798a46901704fcbdf3b9e0aa1c4777df57be4d933d559b6b9fa55a8208f4cca64596f52", 0x36}], 0x7, &(0x7f0000000840)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x16}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x98}}, {{&(0x7f0000000900)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10, &(0x7f00000009c0)=[{&(0x7f0000000940)="0d7aff7211bc7a33a4b17e275181cd0ce96012500bda5952f83fa98ce2dcd571b1d0873eaffff2ed5ea6e7c6afe4730c58cb8884254171c1086febd1abbccbcbb4ab364c7393715252c13d7b9d8e1196cd", 0x51}], 0x1, &(0x7f0000000a00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x92}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x74, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0xce, [@multicast2, @multicast2, @loopback, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x2e}]}, @ssrr={0x89, 0x1b, 0xb8, [@empty, @remote, @rand_addr=0x64010102, @broadcast, @local, @dev={0xac, 0x14, 0x14, 0xf}]}, @generic={0x89, 0x9, "1aedf91e03148e"}, @ra={0x94, 0x4}, @noop, @generic={0x1bb, 0x6, "41bd8fe5"}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x13, 0xf6, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @broadcast]}]}}}, @ip_retopts={{0xa4, 0x0, 0x7, {[@cipso={0x86, 0x50, 0x0, [{0x6, 0x3, "14"}, {0x0, 0x4, "19a4"}, {0x1, 0x10, "f91e18aa9840e49919db9e266dd9"}, {0x2, 0x3, "d7"}, {0x7, 0x10, "f3163cf7c0f5bf947f6ac36aa7d6"}, {0x5, 0x10, "5ae8e24e5d28469152fa9543e8de"}, {0x0, 0x10, "aa9617ab7eba5ccfc207bbbce71e"}]}, @timestamp={0x44, 0x8, 0xde, 0x0, 0x4, [0x1]}, @noop, @timestamp={0x44, 0x18, 0x75, 0x0, 0xb, [0x6, 0x5, 0x7, 0xffffffe4, 0x0]}, @timestamp={0x44, 0xc, 0x38, 0x0, 0x2, [0x20, 0x0]}, @noop, @generic={0xb, 0xc, "e622b4e7a39f7be0022a"}, @lsrr={0x83, 0x7, 0xac, [@empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3f72}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast1, @multicast2}}}], 0x1d0}}], 0x2, 0x4000) write$binfmt_misc(r0, &(0x7f0000000c80)=ANY=[@ANYBLOB="bbe7fd2bb93749cab31f316e2e56"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000140)={[{@nodots}, {@fat=@discard}, {@dots}]}, 0x3, 0x18c, &(0x7f00000003c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) socket$rds(0x15, 0x5, 0x0) (async) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) (async) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2321202e2f66696c6530206367726f75702e636f6e74726f6c6c6572730020242020235b2064697363617264206e6f646f74730adafb40e86806da5e020650e3cb00b625f0b1c75450036cf1ee535681575fe513591a65cc32928128a1b331585d8005b504bf915842a35521131ec6d6d0b916a4ac8311d52b52480c80307f70f92cbafb99909712ebaf89c4d18092bc580bafce2524c0cf782ab0da3a414cec906c397a22489261decf37477b058785fadacbb427"], 0xb5) (async) socket$rds(0x15, 0x5, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000cc0)='-!\x00') (async) bind$rds(r2, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) (async) sendmsg$rds(r2, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) socket$packet(0x11, 0x2, 0x300) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @random}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000080)) (async) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6, @link_local}, 0x10) (async) sendmmsg$inet(r2, &(0x7f0000000c00)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)="36ebcc85e56abb9d87c93ace500913fa3165f1079594cdb602be6de168d519b5ef75ef25e51537b1d00451fd6ba24df449cd1d4b2b18dc98632de256954330962ec5f82c127ad91a855dc6dd0cb131f942ce010364a0ea081f47ca497f9c29e1427f22f1964a65eb562a6e8a482b9316ce34e98435327009b116f465fa2083f335c7efb8e59f834408ee03a4577b7c8641", 0x91}, {&(0x7f0000000240)="7652c0b6ef86a2bcb5c1ff9c3f3a472083e0ba3323dcd857462190be1aa88c", 0x1f}, {&(0x7f0000000580)="c7bf0f0000c18006bce55275701a851095722e132db484c3a48598ea8a6cdc4a0f5c5bf7fb72c42e02e07d95249c3cc3758c35f6279a1b10d28c9e821a80be84fc3a9a56fdb2525476c3bd2a00512f7a4820e429aed919be86f3eb11c467fd43d61456eb94dd111310f421fece553ee7f080542ce868de79c3facc91f939a4af9b4742d514ab3e2b", 0x88}, {&(0x7f0000000380)="f31a3a81e783a85eadcd40c2815b180b646eadf651a06ef776583675c3ccd3570d", 0x21}, {&(0x7f0000000640)="9a6c8f442c1885f0910e73b3ab34d813ff76b347a7fd5e225b82111e53de88e8de1ac8988d44efa4c288f3022895a5b6324506929145928c9edb2b14b05f1b1bebf5068970eb6bc9770d22f1b056f17fb46db014e4204de2afe285bba7e322c2b2f2f1580fe7db8a", 0x68}, {&(0x7f00000006c0)="2150e0398dd3fd0c4e682284f58b7b5e23843a2c679b9146692caa51506e9b1f0ad8bbc8d1aeb8f8985a8966adf0e54a6162545efff0d4720c974b81c740effc50edeadb3b388eb79dff2673a8edfa86c7e6e4f36c41331a9a5b0d94be9ae11a38146d50336a70fed211f11408c134c502c56d8cdc00ebda1fb4c04314624581ceb1f6ed2c7f89bb94533483b4af139203d7ea5318b2ef28383144a94089bdfd384814", 0xa3}, {&(0x7f0000000780)="506f4eb20e805b0947fde8a3d019ed4bb146b798a46901704fcbdf3b9e0aa1c4777df57be4d933d559b6b9fa55a8208f4cca64596f52", 0x36}], 0x7, &(0x7f0000000840)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x16}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x98}}, {{&(0x7f0000000900)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10, &(0x7f00000009c0)=[{&(0x7f0000000940)="0d7aff7211bc7a33a4b17e275181cd0ce96012500bda5952f83fa98ce2dcd571b1d0873eaffff2ed5ea6e7c6afe4730c58cb8884254171c1086febd1abbccbcbb4ab364c7393715252c13d7b9d8e1196cd", 0x51}], 0x1, &(0x7f0000000a00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x92}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x74, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0xce, [@multicast2, @multicast2, @loopback, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x2e}]}, @ssrr={0x89, 0x1b, 0xb8, [@empty, @remote, @rand_addr=0x64010102, @broadcast, @local, @dev={0xac, 0x14, 0x14, 0xf}]}, @generic={0x89, 0x9, "1aedf91e03148e"}, @ra={0x94, 0x4}, @noop, @generic={0x1bb, 0x6, "41bd8fe5"}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x13, 0xf6, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @broadcast]}]}}}, @ip_retopts={{0xa4, 0x0, 0x7, {[@cipso={0x86, 0x50, 0x0, [{0x6, 0x3, "14"}, {0x0, 0x4, "19a4"}, {0x1, 0x10, "f91e18aa9840e49919db9e266dd9"}, {0x2, 0x3, "d7"}, {0x7, 0x10, "f3163cf7c0f5bf947f6ac36aa7d6"}, {0x5, 0x10, "5ae8e24e5d28469152fa9543e8de"}, {0x0, 0x10, "aa9617ab7eba5ccfc207bbbce71e"}]}, @timestamp={0x44, 0x8, 0xde, 0x0, 0x4, [0x1]}, @noop, @timestamp={0x44, 0x18, 0x75, 0x0, 0xb, [0x6, 0x5, 0x7, 0xffffffe4, 0x0]}, @timestamp={0x44, 0xc, 0x38, 0x0, 0x2, [0x20, 0x0]}, @noop, @generic={0xb, 0xc, "e622b4e7a39f7be0022a"}, @lsrr={0x83, 0x7, 0xac, [@empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3f72}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast1, @multicast2}}}], 0x1d0}}], 0x2, 0x4000) (async) write$binfmt_misc(r0, &(0x7f0000000c80)=ANY=[@ANYBLOB="bbe7fd2bb93749cab31f316e2e56"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) 15:49:45 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8970, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:45 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x6c00}}) 15:49:45 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x25, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xec000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 197.760025][T16346] loop1: detected capacity change from 0 to 256 [ 197.781775][ T27] audit: type=1400 audit(1696780185.615:288): avc: denied { remount } for pid=16344 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 197.792261][T16351] loop4: detected capacity change from 0 to 256 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xec020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x21000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:45 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8971, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:45 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x7101}}) 15:49:45 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x50, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0xfc000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 197.868187][T16363] loop1: detected capacity change from 0 to 256 [ 197.890961][T16351] batadv_slave_0: entered promiscuous mode [ 197.932933][T16351] batadv0: entered promiscuous mode 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x22000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:45 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x7300}}) 15:49:45 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8990, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:45 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000140)={[{@nodots}, {@fat=@discard}, {@dots}]}, 0x3, 0x18c, &(0x7f00000003c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async, rerun: 64) r1 = socket$rds(0x15, 0x5, 0x0) (rerun: 64) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2321202e2f66696c6530206367726f75702e636f6e74726f6c6c6572730020242020235b2064697363617264206e6f646f74730adafb40e86806da5e020650e3cb00b625f0b1c75450036cf1ee535681575fe513591a65cc32928128a1b331585d8005b504bf915842a35521131ec6d6d0b916a4ac8311d52b52480c80307f70f92cbafb99909712ebaf89c4d18092bc580bafce2524c0cf782ab0da3a414cec906c397a22489261decf37477b058785fadacbb427"], 0xb5) (async, rerun: 32) r2 = socket$rds(0x15, 0x5, 0x0) (rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000cc0)='-!\x00') (async) bind$rds(r2, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) (async) sendmsg$rds(r2, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @random}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6, @link_local}, 0x10) sendmmsg$inet(r2, &(0x7f0000000c00)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)="36ebcc85e56abb9d87c93ace500913fa3165f1079594cdb602be6de168d519b5ef75ef25e51537b1d00451fd6ba24df449cd1d4b2b18dc98632de256954330962ec5f82c127ad91a855dc6dd0cb131f942ce010364a0ea081f47ca497f9c29e1427f22f1964a65eb562a6e8a482b9316ce34e98435327009b116f465fa2083f335c7efb8e59f834408ee03a4577b7c8641", 0x91}, {&(0x7f0000000240)="7652c0b6ef86a2bcb5c1ff9c3f3a472083e0ba3323dcd857462190be1aa88c", 0x1f}, {&(0x7f0000000580)="c7bf0f0000c18006bce55275701a851095722e132db484c3a48598ea8a6cdc4a0f5c5bf7fb72c42e02e07d95249c3cc3758c35f6279a1b10d28c9e821a80be84fc3a9a56fdb2525476c3bd2a00512f7a4820e429aed919be86f3eb11c467fd43d61456eb94dd111310f421fece553ee7f080542ce868de79c3facc91f939a4af9b4742d514ab3e2b", 0x88}, {&(0x7f0000000380)="f31a3a81e783a85eadcd40c2815b180b646eadf651a06ef776583675c3ccd3570d", 0x21}, {&(0x7f0000000640)="9a6c8f442c1885f0910e73b3ab34d813ff76b347a7fd5e225b82111e53de88e8de1ac8988d44efa4c288f3022895a5b6324506929145928c9edb2b14b05f1b1bebf5068970eb6bc9770d22f1b056f17fb46db014e4204de2afe285bba7e322c2b2f2f1580fe7db8a", 0x68}, {&(0x7f00000006c0)="2150e0398dd3fd0c4e682284f58b7b5e23843a2c679b9146692caa51506e9b1f0ad8bbc8d1aeb8f8985a8966adf0e54a6162545efff0d4720c974b81c740effc50edeadb3b388eb79dff2673a8edfa86c7e6e4f36c41331a9a5b0d94be9ae11a38146d50336a70fed211f11408c134c502c56d8cdc00ebda1fb4c04314624581ceb1f6ed2c7f89bb94533483b4af139203d7ea5318b2ef28383144a94089bdfd384814", 0xa3}, {&(0x7f0000000780)="506f4eb20e805b0947fde8a3d019ed4bb146b798a46901704fcbdf3b9e0aa1c4777df57be4d933d559b6b9fa55a8208f4cca64596f52", 0x36}], 0x7, &(0x7f0000000840)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x16}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x98}}, {{&(0x7f0000000900)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10, &(0x7f00000009c0)=[{&(0x7f0000000940)="0d7aff7211bc7a33a4b17e275181cd0ce96012500bda5952f83fa98ce2dcd571b1d0873eaffff2ed5ea6e7c6afe4730c58cb8884254171c1086febd1abbccbcbb4ab364c7393715252c13d7b9d8e1196cd", 0x51}], 0x1, &(0x7f0000000a00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x92}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x74, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0xce, [@multicast2, @multicast2, @loopback, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x2e}]}, @ssrr={0x89, 0x1b, 0xb8, [@empty, @remote, @rand_addr=0x64010102, @broadcast, @local, @dev={0xac, 0x14, 0x14, 0xf}]}, @generic={0x89, 0x9, "1aedf91e03148e"}, @ra={0x94, 0x4}, @noop, @generic={0x1bb, 0x6, "41bd8fe5"}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x13, 0xf6, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @broadcast]}]}}}, @ip_retopts={{0xa4, 0x0, 0x7, {[@cipso={0x86, 0x50, 0x0, [{0x6, 0x3, "14"}, {0x0, 0x4, "19a4"}, {0x1, 0x10, "f91e18aa9840e49919db9e266dd9"}, {0x2, 0x3, "d7"}, {0x7, 0x10, "f3163cf7c0f5bf947f6ac36aa7d6"}, {0x5, 0x10, "5ae8e24e5d28469152fa9543e8de"}, {0x0, 0x10, "aa9617ab7eba5ccfc207bbbce71e"}]}, @timestamp={0x44, 0x8, 0xde, 0x0, 0x4, [0x1]}, @noop, @timestamp={0x44, 0x18, 0x75, 0x0, 0xb, [0x6, 0x5, 0x7, 0xffffffe4, 0x0]}, @timestamp={0x44, 0xc, 0x38, 0x0, 0x2, [0x20, 0x0]}, @noop, @generic={0xb, 0xc, "e622b4e7a39f7be0022a"}, @lsrr={0x83, 0x7, 0xac, [@empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3f72}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast1, @multicast2}}}], 0x1d0}}], 0x2, 0x4000) (async) write$binfmt_misc(r0, &(0x7f0000000c80)=ANY=[@ANYBLOB="bbe7fd2bb93749cab31f316e2e56"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async, rerun: 32) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (rerun: 32) 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x24000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 197.961221][T16379] loop1: detected capacity change from 0 to 256 [ 197.983615][T16349] batadv0: left promiscuous mode [ 197.988698][T16349] batadv_slave_0: left promiscuous mode 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x2], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:45 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x204, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x3], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x25000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 198.034218][T16391] loop4: detected capacity change from 0 to 256 15:49:45 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8991, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x4], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x26000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:46 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x7400}}) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x5], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 198.109524][T16405] loop1: detected capacity change from 0 to 256 [ 198.117355][T16391] batadv_slave_0: entered promiscuous mode [ 198.141837][T16391] batadv0: entered promiscuous mode 15:49:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x300, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x6], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x28000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:46 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000000c0)) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:46 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8992, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 198.226416][T16390] batadv0: left promiscuous mode [ 198.231445][T16390] batadv_slave_0: left promiscuous mode [ 198.241746][T16430] loop1: detected capacity change from 0 to 256 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x29000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:46 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x7a00}}) 15:49:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x402, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x7], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:46 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000000c0)) (async) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:46 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8993, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x2a000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 198.309851][T16443] loop4: detected capacity change from 0 to 256 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x8], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 198.359275][T16452] loop1: detected capacity change from 0 to 256 15:49:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x406, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:46 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8994, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:46 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x8e01}}) 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x2c000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x9], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 198.445765][T16465] loop4: detected capacity change from 0 to 256 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x2d000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xa], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:46 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8) (async) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000000c0)) (async) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:46 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8995, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xb], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 198.507019][T16482] loop1: detected capacity change from 0 to 256 15:49:46 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x9c02}}) 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x2e000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x500, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xc], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x30000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:46 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89a2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 198.587918][T16498] loop4: detected capacity change from 0 to 256 15:49:46 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r1}, 0x20) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x40a8, @dev={0xfe, 0x80, '\x00', 0xc}, 0xffffffff}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r3, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f2e578656", @ANYRESOCT=r3], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x80010, r2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x60) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xd], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:46 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x9c03}}) 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x31000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xe], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x600, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 198.672621][T16512] loop1: detected capacity change from 0 to 256 [ 198.711850][T16521] loop4: detected capacity change from 0 to 256 15:49:46 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89a3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x32000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:46 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) (async) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r1}, 0x20) (async) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x40a8, @dev={0xfe, 0x80, '\x00', 0xc}, 0xffffffff}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r3, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f2e578656", @ANYRESOCT=r3], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x80010, r2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x60) 15:49:46 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xaa00}}) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x10], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 198.785976][T16533] loop1: detected capacity change from 0 to 256 15:49:46 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) (async) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r1}, 0x20) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r1}, 0x20) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x40a8, @dev={0xfe, 0x80, '\x00', 0xc}, 0xffffffff}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket$rds(0x15, 0x5, 0x0) (async) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r3, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f2e578656", @ANYRESOCT=r3], 0x81) (async) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f2e578656", @ANYRESOCT=r3], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x80010, r2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x60) 15:49:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x604, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x34000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x11], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x3a000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:46 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xb201}}) 15:49:46 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:46 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB='tlaxed,\x00'/18], 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 198.896937][T16558] loop4: detected capacity change from 0 to 256 [ 198.905726][T16560] loop1: detected capacity change from 0 to 256 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x3e000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x12], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:46 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xb600}}) 15:49:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x700, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:46 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89b1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x16], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x42000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 198.981119][T16574] loop4: detected capacity change from 0 to 256 [ 199.009133][T16574] FAT-fs (loop4): Unrecognized mount option "tlaxed" or missing value 15:49:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x43000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x25], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:46 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89bc, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x810, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 199.064382][T16586] loop1: detected capacity change from 0 to 256 15:49:46 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB='tlaxed,\x00'/18], 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x48], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:47 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xb802}}) 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x43050000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:47 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 199.163380][T16604] loop1: detected capacity change from 0 to 256 15:49:47 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xc000}}) 15:49:47 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x900, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x4c], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:47 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB='tlaxed,\x00'/18], 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x48000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 199.203772][T16611] loop4: detected capacity change from 0 to 256 15:49:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x4d], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:47 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:47 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xc100}}) 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x49000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x68], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 199.277929][T16629] loop1: detected capacity change from 0 to 256 15:49:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x6c], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x4a000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:47 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xa00, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:47 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 199.337263][T16637] loop4: detected capacity change from 0 to 256 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x4c000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:47 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3205079, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x198, &(0x7f0000000200)="$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") r1 = open_tree(r0, &(0x7f00000000c0)='./file0/file0\x00', 0x99801) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x9, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x20}, [@map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x21}, @jmp={0x5, 0x1, 0x1, 0x4, 0x6, 0x4, 0x10}]}, &(0x7f00000003c0)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000400)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xe, 0xffffffff, 0x1}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000480)=[0xffffffffffffffff, r1, r2], &(0x7f00000004c0)=[{0x0, 0x3, 0x5, 0x6}, {0x2, 0x5, 0x7, 0xb}, {0x5, 0x1, 0x6, 0x1}, {0x1, 0x4, 0x7, 0x5}], 0x10, 0x1}, 0x90) ioctl$FS_IOC_READ_VERITY_METADATA(r3, 0xc0286687, &(0x7f0000000640)={0x3, 0x7fff, 0x6a, &(0x7f00000005c0)=""/106}) 15:49:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x74], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:47 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xd201}}) 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x4e000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 199.425004][T16658] loop1: detected capacity change from 0 to 256 15:49:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x7a], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:47 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xb00, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:47 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f4, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x4f000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 199.508797][T16675] loop4: detected capacity change from 0 to 256 15:49:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x96], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:47 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xd900}}) 15:49:47 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3205079, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x198, &(0x7f0000000200)="$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") r1 = open_tree(r0, &(0x7f00000000c0)='./file0/file0\x00', 0x99801) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x9, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x20}, [@map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x21}, @jmp={0x5, 0x1, 0x1, 0x4, 0x6, 0x4, 0x10}]}, &(0x7f00000003c0)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000400)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xe, 0xffffffff, 0x1}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000480)=[0xffffffffffffffff, r1, r2], &(0x7f00000004c0)=[{0x0, 0x3, 0x5, 0x6}, {0x2, 0x5, 0x7, 0xb}, {0x5, 0x1, 0x6, 0x1}, {0x1, 0x4, 0x7, 0x5}], 0x10, 0x1}, 0x90) ioctl$FS_IOC_READ_VERITY_METADATA(r3, 0xc0286687, &(0x7f0000000640)={0x3, 0x7fff, 0x6a, &(0x7f00000005c0)=""/106}) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3205079, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x198, &(0x7f0000000200)="$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") (async) open_tree(r0, &(0x7f00000000c0)='./file0/file0\x00', 0x99801) (async) openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) syz_init_net_socket$llc(0x1a, 0x1, 0x0) (async) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x9, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x20}, [@map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x21}, @jmp={0x5, 0x1, 0x1, 0x4, 0x6, 0x4, 0x10}]}, &(0x7f00000003c0)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000400)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xe, 0xffffffff, 0x1}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000480)=[0xffffffffffffffff, r1, r2], &(0x7f00000004c0)=[{0x0, 0x3, 0x5, 0x6}, {0x2, 0x5, 0x7, 0xb}, {0x5, 0x1, 0x6, 0x1}, {0x1, 0x4, 0x7, 0x5}], 0x10, 0x1}, 0x90) (async) ioctl$FS_IOC_READ_VERITY_METADATA(r3, 0xc0286687, &(0x7f0000000640)={0x3, 0x7fff, 0x6a, &(0x7f00000005c0)=""/106}) (async) 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x50000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 199.558239][T16682] loop1: detected capacity change from 0 to 256 [ 199.571795][ T27] audit: type=1400 audit(1696780187.405:289): avc: denied { create } for pid=16667 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 15:49:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x98], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:47 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xc00, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x51000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:47 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xd90a}}) 15:49:47 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f5, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 199.646028][T16695] loop4: detected capacity change from 0 to 256 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x52000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x9e], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 199.699224][T16706] loop1: detected capacity change from 0 to 256 [ 199.715544][T16695] loop4: detected capacity change from 0 to 256 15:49:47 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xd00, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x54000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:47 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3205079, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x198, &(0x7f0000000200)="$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") r1 = open_tree(r0, &(0x7f00000000c0)='./file0/file0\x00', 0x99801) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) (async) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x9, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x20}, [@map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x21}, @jmp={0x5, 0x1, 0x1, 0x4, 0x6, 0x4, 0x10}]}, &(0x7f00000003c0)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000400)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xe, 0xffffffff, 0x1}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000480)=[0xffffffffffffffff, r1, r2], &(0x7f00000004c0)=[{0x0, 0x3, 0x5, 0x6}, {0x2, 0x5, 0x7, 0xb}, {0x5, 0x1, 0x6, 0x1}, {0x1, 0x4, 0x7, 0x5}], 0x10, 0x1}, 0x90) ioctl$FS_IOC_READ_VERITY_METADATA(r3, 0xc0286687, &(0x7f0000000640)={0x3, 0x7fff, 0x6a, &(0x7f00000005c0)=""/106}) 15:49:47 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xe402}}) 15:49:47 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f6, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xaa], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x55000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 199.772145][T16727] xt_ct_set_timeout: 69 callbacks suppressed [ 199.772161][T16727] xt_CT: You must specify a L4 protocol and not use inversions on it [ 199.828717][T16736] loop1: detected capacity change from 0 to 256 [ 199.844410][T16739] loop4: detected capacity change from 0 to 256 15:49:47 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xec00}}) 15:49:47 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f7, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xc1], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 199.873008][T16747] selinux_netlink_send: 59 callbacks suppressed [ 199.873026][T16747] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16747 comm=syz-executor.2 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x56000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xca], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:47 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xe00, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:47 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f646f7473a2fa729a9a3b7c6dbb636865636b3d72656c617865642c"], 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='blkio.bfq.idle_time\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c5001, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000001000/0x2000)=nil, &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000004000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)="6314eea9f44b73fa322c8a9e342163b46c96b5b6e69a646d8f992f7c8ce9b08cd4cbbcdfe144d99ca9c1ab957130e0963f2905874a6ee28271d54873f74dc870302bb46d9207d9cac6ce", 0x4a, r2}, 0x68) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$cgroup(r1, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000340)='io.stat\x00', 0x0, 0x0) 15:49:47 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f8, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 199.898875][T16744] xt_CT: You must specify a L4 protocol and not use inversions on it [ 199.938786][T16756] xt_CT: You must specify a L4 protocol and not use inversions on it [ 199.993265][T16763] xt_CT: You must specify a L4 protocol and not use inversions on it [ 200.007522][T16770] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16770 comm=syz-executor.2 [ 200.011113][T16768] loop4: detected capacity change from 0 to 256 [ 200.025238][T16772] loop1: detected capacity change from 0 to 256 15:49:47 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0xff0a}}) 15:49:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xd9], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x58000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 200.038916][T16768] FAT-fs (loop4): Unrecognized mount option "nodots¢úršš;|m»check=relaxed" or missing value 15:49:47 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f9, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:47 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f646f7473a2fa729a9a3b7c6dbb636865636b3d72656c617865642c"], 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='blkio.bfq.idle_time\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c5001, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000001000/0x2000)=nil, &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000004000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)="6314eea9f44b73fa322c8a9e342163b46c96b5b6e69a646d8f992f7c8ce9b08cd4cbbcdfe144d99ca9c1ab957130e0963f2905874a6ee28271d54873f74dc870302bb46d9207d9cac6ce", 0x4a, r2}, 0x68) (async, rerun: 64) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (rerun: 64) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) r3 = openat$cgroup(r1, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000340)='io.stat\x00', 0x0, 0x0) [ 200.077184][ T27] audit: type=1400 audit(1696780187.915:290): avc: denied { write } for pid=16767 comm="syz-executor.4" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 200.118856][T16782] xt_CT: You must specify a L4 protocol and not use inversions on it 15:49:47 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xf00, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xec], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 200.125115][T16785] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16785 comm=syz-executor.2 [ 200.157747][T16790] loop4: detected capacity change from 0 to 256 [ 200.170083][T16794] xt_CT: You must specify a L4 protocol and not use inversions on it [ 200.172225][T16793] loop1: detected capacity change from 0 to 256 15:49:48 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}}}) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xfc], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:48 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89fa, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x59000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x125], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 200.181599][T16790] FAT-fs (loop4): Unrecognized mount option "nodots¢úršš;|m»check=relaxed" or missing value [ 200.201099][ T27] audit: type=1400 audit(1696780187.915:291): avc: denied { open } for pid=16767 comm="syz-executor.4" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 15:49:48 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f646f7473a2fa729a9a3b7c6dbb636865636b3d72656c617865642c"], 0x2, 0x183, &(0x7f00000005c0)="$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") (async) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='blkio.bfq.idle_time\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c5001, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000001000/0x2000)=nil, &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000004000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)="6314eea9f44b73fa322c8a9e342163b46c96b5b6e69a646d8f992f7c8ce9b08cd4cbbcdfe144d99ca9c1ab957130e0963f2905874a6ee28271d54873f74dc870302bb46d9207d9cac6ce", 0x4a, r2}, 0x68) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) r3 = openat$cgroup(r1, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000340)='io.stat\x00', 0x0, 0x0) 15:49:48 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89fb, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x138], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 200.247123][T16802] xt_CT: You must specify a L4 protocol and not use inversions on it [ 200.270738][T16803] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16803 comm=syz-executor.2 15:49:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x5a000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:48 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89fc, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 200.304114][T16811] xt_CT: You must specify a L4 protocol and not use inversions on it [ 200.330457][T16817] loop4: detected capacity change from 0 to 256 15:49:48 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1008, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x171], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:48 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x2}}) 15:49:48 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89fd, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:48 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000100)={[], [{@smackfstransmute={'smackfstransmute', 0x3d, '{&/^)\\.&/(:'}}, {@hash}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) sendfile(r1, r0, &(0x7f00000001c0)=0x6, 0x587) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6f2e578656b584b823344b0bb015c8815d380b57b2577a6c9f71d9614fa4a1aa4eeeaa64ed8fb61f79cf6fab4efca385409bce1df7b58ca6ed1d01d839aa462d1e77b41080084d2eb19a6b72d2ce3826fb445be6"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000000c0)=0x1, 0x4) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f00000000c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 200.369056][T16824] xt_CT: You must specify a L4 protocol and not use inversions on it [ 200.378577][T16827] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16827 comm=syz-executor.2 15:49:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x5c000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x18e], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:48 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x3}}) [ 200.438948][T16837] xt_CT: You must specify a L4 protocol and not use inversions on it [ 200.466822][T16842] loop1: detected capacity change from 0 to 256 [ 200.482425][T16841] loop4: detected capacity change from 0 to 256 [ 200.498946][T16850] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16850 comm=syz-executor.2 15:49:48 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89fe, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x1d0], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x5e000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x1d2], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 200.521148][T16841] FAT-fs (loop4): Unrecognized mount option "smackfstransmute={&/^)\.&/(:" or missing value 15:49:48 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1020, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x213], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:48 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000100)={[], [{@smackfstransmute={'smackfstransmute', 0x3d, '{&/^)\\.&/(:'}}, {@hash}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) sendfile(r1, r0, &(0x7f00000001c0)=0x6, 0x587) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6f2e578656b584b823344b0bb015c8815d380b57b2577a6c9f71d9614fa4a1aa4eeeaa64ed8fb61f79cf6fab4efca385409bce1df7b58ca6ed1d01d839aa462d1e77b41080084d2eb19a6b72d2ce3826fb445be6"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000000c0)=0x1, 0x4) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f00000000c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000100)={[], [{@smackfstransmute={'smackfstransmute', 0x3d, '{&/^)\\.&/(:'}}, {@hash}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) sendfile(r1, r0, &(0x7f00000001c0)=0x6, 0x587) (async) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6f2e578656b584b823344b0bb015c8815d380b57b2577a6c9f71d9614fa4a1aa4eeeaa64ed8fb61f79cf6fab4efca385409bce1df7b58ca6ed1d01d839aa462d1e77b41080084d2eb19a6b72d2ce3826fb445be6"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000000c0)=0x1, 0x4) (async) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f00000000c0)) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) [ 200.564980][T16857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16857 comm=syz-executor.2 15:49:48 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x4}}) 15:49:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x5f000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:48 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89ff, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x23a], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x60000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x248], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:48 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1100, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:48 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40049409, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 200.662532][T16874] loop1: detected capacity change from 0 to 256 [ 200.664466][T16875] loop4: detected capacity change from 0 to 256 [ 200.681377][T16881] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16881 comm=syz-executor.2 [ 200.698036][T16875] FAT-fs (loop4): Unrecognized mount option "smackfstransmute={&/^)\.&/(:" or missing value 15:49:48 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x5}}) 15:49:48 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40086602, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:48 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000100)={[], [{@smackfstransmute={'smackfstransmute', 0x3d, '{&/^)\\.&/(:'}}, {@hash}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) sendfile(r1, r0, &(0x7f00000001c0)=0x6, 0x587) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6f2e578656b584b823344b0bb015c8815d380b57b2577a6c9f71d9614fa4a1aa4eeeaa64ed8fb61f79cf6fab4efca385409bce1df7b58ca6ed1d01d839aa462d1e77b41080084d2eb19a6b72d2ce3826fb445be6"], 0x81) (async) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6f2e578656b584b823344b0bb015c8815d380b57b2577a6c9f71d9614fa4a1aa4eeeaa64ed8fb61f79cf6fab4efca385409bce1df7b58ca6ed1d01d839aa462d1e77b41080084d2eb19a6b72d2ce3826fb445be6"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000000c0)=0x1, 0x4) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f00000000c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x260], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:48 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1200, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 200.756868][T16887] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16887 comm=syz-executor.2 [ 200.771185][T16893] loop1: detected capacity change from 0 to 256 15:49:48 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x6}}) 15:49:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x64000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x286], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:48 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1300, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 200.821414][T16903] loop4: detected capacity change from 0 to 256 [ 200.837248][T16903] FAT-fs (loop4): Unrecognized mount option "smackfstransmute={&/^)\.&/(:" or missing value [ 200.862861][T16910] loop1: detected capacity change from 0 to 256 15:49:48 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40087602, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:48 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@dots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x2d7], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x2e4], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 200.902089][T16913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16913 comm=syz-executor.2 [ 200.926304][T16921] loop1: detected capacity change from 0 to 256 15:49:48 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x7}}) 15:49:48 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x2000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x65000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x2ec], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:48 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@dots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:48 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x401c5820, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 200.988870][T16932] loop4: detected capacity change from 0 to 256 15:49:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x65580000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:48 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x2010, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 201.045424][T16943] loop1: detected capacity change from 0 to 256 15:49:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x300], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:48 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x8}}) 15:49:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x66000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:48 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4020940d, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 201.086702][T16951] loop4: detected capacity change from 0 to 256 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x33e], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@dots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async, rerun: 32) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (rerun: 32) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:49 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x80086601, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 201.140632][T16960] loop1: detected capacity change from 0 to 256 15:49:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x2200, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x35a], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x68000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x365], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x9}}) 15:49:49 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x80087601, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 201.227883][T16975] loop4: detected capacity change from 0 to 256 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x69000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x39c], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 4: getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000300)=0xc) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000000c0)={[{@fat=@flush}, {@nodots}, {@nodots}, {@fat=@nfs}]}, 0x2, 0x18d, &(0x7f0000000140)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x2500, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 201.283365][T16987] loop1: detected capacity change from 0 to 256 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x500], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xa}}) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x600], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6a000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 201.365138][T17005] loop1: detected capacity change from 0 to 256 15:49:49 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x801c581f, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:49 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xb}}) 15:49:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x3f00, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x700], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 201.406677][T17006] loop4: detected capacity change from 0 to 256 15:49:49 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0045878, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6c000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 4: getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000300)=0xc) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000000c0)={[{@fat=@flush}, {@nodots}, {@nodots}, {@fat=@nfs}]}, 0x2, 0x18d, &(0x7f0000000140)="$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") (async) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000000c0)={[{@fat=@flush}, {@nodots}, {@nodots}, {@fat=@nfs}]}, 0x2, 0x18d, &(0x7f0000000140)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x81) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x900], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x6d000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xc}}) 15:49:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x4000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 201.490180][T17026] loop1: detected capacity change from 0 to 256 15:49:49 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0045878, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xa00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x70000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xb00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x71000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 201.589155][T17046] loop1: detected capacity change from 0 to 256 [ 201.602186][T17048] loop4: detected capacity change from 0 to 256 15:49:49 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xd}}) 15:49:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x5000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:49 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:49 executing program 4: getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000300)=0xc) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000000c0)={[{@fat=@flush}, {@nodots}, {@nodots}, {@fat=@nfs}]}, 0x2, 0x18d, &(0x7f0000000140)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xc00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x72000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xedc0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:49 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xe}}) [ 201.713754][T17068] loop4: detected capacity change from 0 to 256 [ 201.717161][T17073] loop1: detected capacity change from 0 to 256 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x74000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xd00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc020660b, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x75000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xe00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xff03, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 201.809816][T17090] loop1: detected capacity change from 0 to 256 15:49:49 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB='nodots,nodotcheck=relaxed,\x00'], 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$rds(r0, &(0x7f0000001f80)={&(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/118, 0x76}, {&(0x7f0000000200)=""/100, 0x64}, {&(0x7f0000000280)=""/12, 0xc}, {&(0x7f00000002c0)=""/145, 0x91}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000380)=""/218, 0xda}, {&(0x7f0000000480)=""/31, 0x1f}], 0x7, &(0x7f0000001dc0)=[@rdma_args={0x48, 0x114, 0x1, {{0x101, 0xff}, {&(0x7f0000001780)=""/161, 0xa1}, &(0x7f0000000580)=[{&(0x7f0000000540)}, {&(0x7f0000001840)=""/197, 0xc5}], 0x2, 0x48, 0x5}}, @fadd={0x58, 0x114, 0x6, {{0x5, 0x2d}, &(0x7f0000001940)=0x2c, &(0x7f0000001980)=0x3, 0x0, 0x1ff, 0x2b971529, 0x5, 0x12, 0x9}}, @mask_fadd={0x58, 0x114, 0x8, {{0x8, 0x9}, &(0x7f00000019c0)=0x800, &(0x7f0000001a00)=0x8, 0xffffffff, 0x0, 0x9, 0x6, 0x4, 0x3902}}, @fadd={0x58, 0x114, 0x6, {{0x1, 0x7}, &(0x7f0000001a40)=0xffffffff, &(0x7f0000001a80)=0x3, 0x800, 0x400000000, 0x2, 0x1, 0x20, 0x80000000}}, @rdma_args={0x48, 0x114, 0x1, {{0x2, 0x623f}, {&(0x7f0000001ac0)=""/229, 0xe5}, &(0x7f0000001d80)=[{&(0x7f0000001bc0)=""/222, 0xde}, {&(0x7f0000001cc0)=""/171, 0xab}], 0x2, 0x2, 0x7}}], 0x198, 0x40}, 0x24044804) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x76000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x10}}) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x1100], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x20000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 201.889847][T17103] loop1: detected capacity change from 0 to 256 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x1200], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x78000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x79000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x12e8], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 201.944974][T17114] loop4: detected capacity change from 0 to 256 [ 201.973648][T17114] FAT-fs (loop4): Unrecognized mount option "nodotcheck=relaxed" or missing value [ 201.987780][T17122] loop1: detected capacity change from 0 to 256 15:49:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x3ffff, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x7a000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB='nodots,nodotcheck=relaxed,\x00'], 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$rds(r0, &(0x7f0000001f80)={&(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/118, 0x76}, {&(0x7f0000000200)=""/100, 0x64}, {&(0x7f0000000280)=""/12, 0xc}, {&(0x7f00000002c0)=""/145, 0x91}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000380)=""/218, 0xda}, {&(0x7f0000000480)=""/31, 0x1f}], 0x7, &(0x7f0000001dc0)=[@rdma_args={0x48, 0x114, 0x1, {{0x101, 0xff}, {&(0x7f0000001780)=""/161, 0xa1}, &(0x7f0000000580)=[{&(0x7f0000000540)}, {&(0x7f0000001840)=""/197, 0xc5}], 0x2, 0x48, 0x5}}, @fadd={0x58, 0x114, 0x6, {{0x5, 0x2d}, &(0x7f0000001940)=0x2c, &(0x7f0000001980)=0x3, 0x0, 0x1ff, 0x2b971529, 0x5, 0x12, 0x9}}, @mask_fadd={0x58, 0x114, 0x8, {{0x8, 0x9}, &(0x7f00000019c0)=0x800, &(0x7f0000001a00)=0x8, 0xffffffff, 0x0, 0x9, 0x6, 0x4, 0x3902}}, @fadd={0x58, 0x114, 0x6, {{0x1, 0x7}, &(0x7f0000001a40)=0xffffffff, &(0x7f0000001a80)=0x3, 0x800, 0x400000000, 0x2, 0x1, 0x20, 0x80000000}}, @rdma_args={0x48, 0x114, 0x1, {{0x2, 0x623f}, {&(0x7f0000001ac0)=""/229, 0xe5}, &(0x7f0000001d80)=[{&(0x7f0000001bc0)=""/222, 0xde}, {&(0x7f0000001cc0)=""/171, 0xab}], 0x2, 0x2, 0x7}}], 0x198, 0x40}, 0x24044804) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:49 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x11}}) 15:49:49 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x1302], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x7b1f0000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x40000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 202.055562][T17131] loop1: detected capacity change from 0 to 256 15:49:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x80350000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x1600], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x81000000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x100000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 202.127049][T17144] loop1: detected capacity change from 0 to 256 [ 202.139464][T17148] loop4: detected capacity change from 0 to 256 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x2500], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x12}}) 15:49:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)=ANY=[@ANYBLOB='nodots,nodotcheck=relaxed,\x00'], 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$rds(r0, &(0x7f0000001f80)={&(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/118, 0x76}, {&(0x7f0000000200)=""/100, 0x64}, {&(0x7f0000000280)=""/12, 0xc}, {&(0x7f00000002c0)=""/145, 0x91}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000380)=""/218, 0xda}, {&(0x7f0000000480)=""/31, 0x1f}], 0x7, &(0x7f0000001dc0)=[@rdma_args={0x48, 0x114, 0x1, {{0x101, 0xff}, {&(0x7f0000001780)=""/161, 0xa1}, &(0x7f0000000580)=[{&(0x7f0000000540)}, {&(0x7f0000001840)=""/197, 0xc5}], 0x2, 0x48, 0x5}}, @fadd={0x58, 0x114, 0x6, {{0x5, 0x2d}, &(0x7f0000001940)=0x2c, &(0x7f0000001980)=0x3, 0x0, 0x1ff, 0x2b971529, 0x5, 0x12, 0x9}}, @mask_fadd={0x58, 0x114, 0x8, {{0x8, 0x9}, &(0x7f00000019c0)=0x800, &(0x7f0000001a00)=0x8, 0xffffffff, 0x0, 0x9, 0x6, 0x4, 0x3902}}, @fadd={0x58, 0x114, 0x6, {{0x1, 0x7}, &(0x7f0000001a40)=0xffffffff, &(0x7f0000001a80)=0x3, 0x800, 0x400000000, 0x2, 0x1, 0x20, 0x80000000}}, @rdma_args={0x48, 0x114, 0x1, {{0x2, 0x623f}, {&(0x7f0000001ac0)=""/229, 0xe5}, &(0x7f0000001d80)=[{&(0x7f0000001bc0)=""/222, 0xde}, {&(0x7f0000001cc0)=""/171, 0xab}], 0x2, 0x2, 0x7}}], 0x198, 0x40}, 0x24044804) (async, rerun: 32) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (rerun: 32) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x86ddffff, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x2501], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x88470000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 202.217115][T17161] loop1: detected capacity change from 0 to 256 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x3801], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x24}}) 15:49:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x4, 0x6, 0x4, 0x35, 0x3, [{0x2fb, 0x1800000000000000, 0xb, '\x00', 0x1a04}, {0x995, 0x3, 0xcc, '\x00', 0x3080}, {0x8, 0x8, 0x2, '\x00', 0x280}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x88480000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 202.258246][ T3425] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 15:49:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1fffff, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x3a02], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x88640000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x4, 0x6, 0x4, 0x35, 0x3, [{0x2fb, 0x1800000000000000, 0xb, '\x00', 0x1a04}, {0x995, 0x3, 0xcc, '\x00', 0x3080}, {0x8, 0x8, 0x2, '\x00', 0x280}]}) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x3e03], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 202.336007][T17188] loop4: detected capacity change from 0 to 256 [ 202.355404][T17192] loop1: detected capacity change from 0 to 256 15:49:50 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x200000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:50 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x2a}}) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x88a8ffff, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x4800], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x4802], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 202.445112][T17205] loop1: detected capacity change from 0 to 256 [ 202.453737][T17208] loop4: detected capacity change from 0 to 256 15:49:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") (async) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x4, 0x6, 0x4, 0x35, 0x3, [{0x2fb, 0x1800000000000000, 0xb, '\x00', 0x1a04}, {0x995, 0x3, 0xcc, '\x00', 0x3080}, {0x8, 0x8, 0x2, '\x00', 0x280}]}) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x88caffff, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x2f}}) 15:49:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x4c00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x88f7ffff, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x3a}}) [ 202.555128][T17227] loop4: detected capacity change from 0 to 256 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x4d00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x88fbffff, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="304645d266f128a4f0bd7000fddbdf250a100003ff0000081400000014000200fe88000000000000cd02000000000001"], 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x2400c081) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 202.601364][T17240] loop1: detected capacity change from 0 to 256 15:49:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x2000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:50 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x48}}) 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x5a03], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x89020000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x6002], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) close(r1) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="304645d266f128a4f0bd7000fddbdf250a100003ff0000081400000014000200fe88000000000000cd02000000000001"], 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x2400c081) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 202.704458][T17258] loop4: detected capacity change from 0 to 256 [ 202.721534][T17260] loop1: detected capacity change from 0 to 256 15:49:50 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x89060000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x6503], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x2040000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x6800], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x892f0000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x4a}}) [ 202.796960][T17270] loop4: detected capacity change from 0 to 256 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x6c00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) close(r1) (async, rerun: 32) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="304645d266f128a4f0bd7000fddbdf250a100003ff0000081400000014000200fe88000000000000cd02000000000001"], 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x2400c081) (async, rerun: 32) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xc3060000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 202.852662][T17278] loop1: detected capacity change from 0 to 256 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x7101], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xf0ffffff, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x4c}}) 15:49:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x3000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000780)={{0x14}, [@NFT_MSG_NEWRULE={0x114, 0x6, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_RULE_USERDATA={0x91, 0x7, 0x1, 0x0, "2cb3b385197c6be3ee1a242fc5b197aab82ca4d18e0d286ec85b727e4a491403c2b0e40acccbdb592d182cdecd0f6d425330bf13884fb6e91d4f11d08ce42f977598bac37f5ac06df7493b4c834067ad93b623907f22264e4da17e41a4ba3def1b1c491cb755f8150d1be344e200e54a57e7a29a23a487a5427d05023ce07e0eed1a7f67dd59e7637462b3b7db"}, @NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @osf={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_OSF_TTL={0x5, 0x2, 0xa7}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0xd}]}}}]}, @NFTA_RULE_ID={0x8}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x3}, @NFTA_RULE_COMPAT={0x14, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x10}]}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x1}]}, @NFT_MSG_NEWFLOWTABLE={0x58, 0x16, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}]}], {0x14}}, 0x194}, 0x1, 0x0, 0x0, 0x20000010}, 0x200008c0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f00000000c0)={{r0}, {@void, @max}}) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xffffa888, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x7400], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xffffca88, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:50 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000780)={{0x14}, [@NFT_MSG_NEWRULE={0x114, 0x6, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_RULE_USERDATA={0x91, 0x7, 0x1, 0x0, "2cb3b385197c6be3ee1a242fc5b197aab82ca4d18e0d286ec85b727e4a491403c2b0e40acccbdb592d182cdecd0f6d425330bf13884fb6e91d4f11d08ce42f977598bac37f5ac06df7493b4c834067ad93b623907f22264e4da17e41a4ba3def1b1c491cb755f8150d1be344e200e54a57e7a29a23a487a5427d05023ce07e0eed1a7f67dd59e7637462b3b7db"}, @NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @osf={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_OSF_TTL={0x5, 0x2, 0xa7}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0xd}]}}}]}, @NFTA_RULE_ID={0x8}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x3}, @NFTA_RULE_COMPAT={0x14, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x10}]}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x1}]}, @NFT_MSG_NEWFLOWTABLE={0x58, 0x16, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}]}], {0x14}}, 0x194}, 0x1, 0x0, 0x0, 0x20000010}, 0x200008c0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f00000000c0)={{r0}, {@void, @max}}) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000780)={{0x14}, [@NFT_MSG_NEWRULE={0x114, 0x6, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_RULE_USERDATA={0x91, 0x7, 0x1, 0x0, "2cb3b385197c6be3ee1a242fc5b197aab82ca4d18e0d286ec85b727e4a491403c2b0e40acccbdb592d182cdecd0f6d425330bf13884fb6e91d4f11d08ce42f977598bac37f5ac06df7493b4c834067ad93b623907f22264e4da17e41a4ba3def1b1c491cb755f8150d1be344e200e54a57e7a29a23a487a5427d05023ce07e0eed1a7f67dd59e7637462b3b7db"}, @NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @osf={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_OSF_TTL={0x5, 0x2, 0xa7}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0xd}]}}}]}, @NFTA_RULE_ID={0x8}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x3}, @NFTA_RULE_COMPAT={0x14, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x10}]}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x1}]}, @NFT_MSG_NEWFLOWTABLE={0x58, 0x16, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}]}], {0x14}}, 0x194}, 0x1, 0x0, 0x0, 0x20000010}, 0x200008c0) (async) socket$rds(0x15, 0x5, 0x0) (async) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) (async) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f00000000c0)={{r0}, {@void, @max}}) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) [ 202.966215][T17307] loop1: detected capacity change from 0 to 256 [ 202.973263][T17310] loop4: detected capacity change from 0 to 256 15:49:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x4000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:50 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x4d}}) 15:49:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x7a00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xffffdd86, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 203.064010][T17323] loop4: detected capacity change from 0 to 256 15:49:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000780)={{0x14}, [@NFT_MSG_NEWRULE={0x114, 0x6, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_RULE_USERDATA={0x91, 0x7, 0x1, 0x0, "2cb3b385197c6be3ee1a242fc5b197aab82ca4d18e0d286ec85b727e4a491403c2b0e40acccbdb592d182cdecd0f6d425330bf13884fb6e91d4f11d08ce42f977598bac37f5ac06df7493b4c834067ad93b623907f22264e4da17e41a4ba3def1b1c491cb755f8150d1be344e200e54a57e7a29a23a487a5427d05023ce07e0eed1a7f67dd59e7637462b3b7db"}, @NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @osf={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_OSF_TTL={0x5, 0x2, 0xa7}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0xd}]}}}]}, @NFTA_RULE_ID={0x8}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x3}, @NFTA_RULE_COMPAT={0x14, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x10}]}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x1}]}, @NFT_MSG_NEWFLOWTABLE={0x58, 0x16, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}]}], {0x14}}, 0x194}, 0x1, 0x0, 0x0, 0x20000010}, 0x200008c0) (async) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) (async) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f00000000c0)={{r0}, {@void, @max}}) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:50 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xffffe000, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x8602], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x68}}) [ 203.110281][T17330] loop1: detected capacity change from 0 to 256 15:49:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x5000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xfffff788, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x8e01], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0xaa0080, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@cache_loose}, {@cache_loose}, {@version_L}, {@version_u}, {@nodevmap}, {@access_uid={'access', 0x3d, r2}}, {@noextend}, {@privport}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0xa, 0x64, 0x30, 0x36, 0x62, 0x31, 0x35], 0x2d, [0x62, 0x39, 0x65, 0x37], 0x2d, [0x30, 0x64, 0x38, 0x32], 0x2d, [0x61, 0x66, 0x34, 0x34], 0x2d, [0x35, 0x6, 0x64, 0x31, 0x65, 0x31, 0x33, 0x66]}}}, {@obj_user={'obj_user', 0x3d, 'msdos\x00'}}, {@smackfshat}, {@audit}]}}) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="6f578656943dc2281246790fcf76d651f027629b5d0d745bc5e4e9892ba9c264ecba349bd624b5a728b8f74c25948d060caf5955f9c3a5aa6b0e0024fc30c6a48626e11861859425dd76cff7cbfa1f503f7f64e6a0efd652f6378245400c77d5f7757edfd4a910f9da43a6f052676b652cb7909a24d6ec70f14d8af25e84f0d436559ff40cc592ede4fd1225a7658b3c9b85"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 203.177844][T17338] loop4: detected capacity change from 0 to 256 15:49:51 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x6c}}) 15:49:51 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x9600], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xfffffb88, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) (async) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0xaa0080, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@cache_loose}, {@cache_loose}, {@version_L}, {@version_u}, {@nodevmap}, {@access_uid={'access', 0x3d, r2}}, {@noextend}, {@privport}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0xa, 0x64, 0x30, 0x36, 0x62, 0x31, 0x35], 0x2d, [0x62, 0x39, 0x65, 0x37], 0x2d, [0x30, 0x64, 0x38, 0x32], 0x2d, [0x61, 0x66, 0x34, 0x34], 0x2d, [0x35, 0x6, 0x64, 0x31, 0x65, 0x31, 0x33, 0x66]}}}, {@obj_user={'obj_user', 0x3d, 'msdos\x00'}}, {@smackfshat}, {@audit}]}}) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="6f578656943dc2281246790fcf76d651f027629b5d0d745bc5e4e9892ba9c264ecba349bd624b5a728b8f74c25948d060caf5955f9c3a5aa6b0e0024fc30c6a48626e11861859425dd76cff7cbfa1f503f7f64e6a0efd652f6378245400c77d5f7757edfd4a910f9da43a6f052676b652cb7909a24d6ec70f14d8af25e84f0d436559ff40cc592ede4fd1225a7658b3c9b85"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x6000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x9800], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 203.244963][T17350] loop1: detected capacity change from 0 to 256 [ 203.269905][T17357] loop4: detected capacity change from 0 to 256 15:49:51 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x73}}) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x9c03], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 203.336777][T17366] loop4: detected capacity change from 0 to 256 [ 203.355215][T17373] loop1: detected capacity change from 0 to 256 15:49:51 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:51 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x74}}) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x9e00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0xaa0080, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@cache_loose}, {@cache_loose}, {@version_L}, {@version_u}, {@nodevmap}, {@access_uid={'access', 0x3d, r2}}, {@noextend}, {@privport}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0xa, 0x64, 0x30, 0x36, 0x62, 0x31, 0x35], 0x2d, [0x62, 0x39, 0x65, 0x37], 0x2d, [0x30, 0x64, 0x38, 0x32], 0x2d, [0x61, 0x66, 0x34, 0x34], 0x2d, [0x35, 0x6, 0x64, 0x31, 0x65, 0x31, 0x33, 0x66]}}}, {@obj_user={'obj_user', 0x3d, 'msdos\x00'}}, {@smackfshat}, {@audit}]}}) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="6f578656943dc2281246790fcf76d651f027629b5d0d745bc5e4e9892ba9c264ecba349bd624b5a728b8f74c25948d060caf5955f9c3a5aa6b0e0024fc30c6a48626e11861859425dd76cff7cbfa1f503f7f64e6a0efd652f6378245400c77d5f7757edfd4a910f9da43a6f052676b652cb7909a24d6ec70f14d8af25e84f0d436559ff40cc592ede4fd1225a7658b3c9b85"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) (async) setuid(r2) (async) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0xaa0080, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@cache_loose}, {@cache_loose}, {@version_L}, {@version_u}, {@nodevmap}, {@access_uid={'access', 0x3d, r2}}, {@noextend}, {@privport}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0xa, 0x64, 0x30, 0x36, 0x62, 0x31, 0x35], 0x2d, [0x62, 0x39, 0x65, 0x37], 0x2d, [0x30, 0x64, 0x38, 0x32], 0x2d, [0x61, 0x66, 0x34, 0x34], 0x2d, [0x35, 0x6, 0x64, 0x31, 0x65, 0x31, 0x33, 0x66]}}}, {@obj_user={'obj_user', 0x3d, 'msdos\x00'}}, {@smackfshat}, {@audit}]}}) (async) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="6f578656943dc2281246790fcf76d651f027629b5d0d745bc5e4e9892ba9c264ecba349bd624b5a728b8f74c25948d060caf5955f9c3a5aa6b0e0024fc30c6a48626e11861859425dd76cff7cbfa1f503f7f64e6a0efd652f6378245400c77d5f7757edfd4a910f9da43a6f052676b652cb7909a24d6ec70f14d8af25e84f0d436559ff40cc592ede4fd1225a7658b3c9b85"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0xfffffff0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x6040000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xaa00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x7a}}) 15:49:51 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x2}, 0x10}], 0x1}, 0x0) [ 203.463252][T17391] loop4: detected capacity change from 0 to 256 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xc100], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 4: r0 = socket(0x2, 0x800, 0x2) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)={0x28, 0x0, 0x9, 0x301, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFCTH_STATUS={0x8}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x81}}]}, 0x28}}, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000000c0)={[{@nodots}, {@nodots}, {@dots}]}, 0x2, 0x194, &(0x7f0000000200)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x8) openat$cgroup_ro(r2, &(0x7f0000000440)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6f2e578656b8c7a6ec7feb1dcde46c1a43ac7d4267e01ade51e906dec5994b415315e3c57beade792b497317589994f2f2eefc0e95eed18af33f3128cc73b8b85cc50f22e280c13369716b"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x7000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x3}, 0x10}], 0x1}, 0x0) [ 203.525659][T17399] loop1: detected capacity change from 0 to 256 15:49:51 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xaa}}) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xca00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x4}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xd001], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x5}, 0x10}], 0x1}, 0x0) [ 203.615352][T17422] loop1: detected capacity change from 0 to 256 [ 203.634993][T17425] loop4: detected capacity change from 0 to 256 15:49:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x8000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:51 executing program 4: r0 = socket(0x2, 0x800, 0x2) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)={0x28, 0x0, 0x9, 0x301, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFCTH_STATUS={0x8}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x81}}]}, 0x28}}, 0x0) (async) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000000c0)={[{@nodots}, {@nodots}, {@dots}]}, 0x2, 0x194, &(0x7f0000000200)="$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") (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x8) (async, rerun: 32) openat$cgroup_ro(r2, &(0x7f0000000440)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async, rerun: 32) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6f2e578656b8c7a6ec7feb1dcde46c1a43ac7d4267e01ade51e906dec5994b415315e3c57beade792b497317589994f2f2eefc0e95eed18af33f3128cc73b8b85cc50f22e280c13369716b"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xd201], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x6}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xb6}}) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x7}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xd702], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 203.751012][T17443] loop1: detected capacity change from 0 to 256 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x8}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 4: r0 = socket(0x2, 0x800, 0x2) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)={0x28, 0x0, 0x9, 0x301, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFCTH_STATUS={0x8}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x81}}]}, 0x28}}, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000000c0)={[{@nodots}, {@nodots}, {@dots}]}, 0x2, 0x194, &(0x7f0000000200)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x8) (async) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x8) openat$cgroup_ro(r2, &(0x7f0000000440)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6f2e578656b8c7a6ec7feb1dcde46c1a43ac7d4267e01ade51e906dec5994b415315e3c57beade792b497317589994f2f2eefc0e95eed18af33f3128cc73b8b85cc50f22e280c13369716b"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xd900], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xc0}}) [ 203.801730][T17458] loop4: detected capacity change from 0 to 256 15:49:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x8100000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x9}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xe402], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 203.867400][ T3425] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0xa}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xe812], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x9000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 203.919455][T17481] loop1: detected capacity change from 0 to 256 [ 203.942336][T17488] loop4: detected capacity change from 0 to 256 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xec00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0xb}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:51 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f00000000c0)) 15:49:51 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xc1}}) 15:49:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xa000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 203.986995][T17495] loop1: detected capacity change from 0 to 256 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xec02], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0xc}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0xd}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xfc00], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0xe}, 0x10}], 0x1}, 0x0) 15:49:51 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 204.083526][T17503] loop4: detected capacity change from 0 to 256 15:49:52 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f00000000c0)) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) socket$rds(0x15, 0x5, 0x0) (async) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) (async) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f00000000c0)) (async) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x28f5c], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0xf}, 0x10}], 0x1}, 0x0) [ 204.129293][T17516] loop1: detected capacity change from 0 to 256 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x40000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xd9}}) 15:49:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xb000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x11}, 0x10}], 0x1}, 0x0) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x1000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 204.197996][T17528] loop4: detected capacity change from 0 to 256 15:49:52 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f00000000c0)) 15:49:52 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xec}}) 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x12}, 0x10}], 0x1}, 0x0) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x2000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x3000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x3a, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 204.292996][T17548] loop1: detected capacity change from 0 to 256 [ 204.300537][T17549] loop4: detected capacity change from 0 to 256 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x29}, 0x10}], 0x1}, 0x0) 15:49:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xc000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:52 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)={0x2, [0x0, 0x0]}, &(0x7f0000000280)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000002c0)={r1, 0x9}, 0x8) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7d8ef4a0602dd28f2b3dfe8315448197bec8c84a8d28306b0e7b288d904a03197552b852cc43e9c8e7ab5c2915539cbc7b001ba3978bdf029f61d47c8c2facf157ef7b64c9a60d9328b2c842b10a4203e60864d42dda6da2cecae8a5abda46b1c3a4c47b684165caf4cbbbcdaaa6dfbd51f8aea907"], 0x81) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0xc, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300)={r4, 0x400}, &(0x7f0000000340)=0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x230000, 0x110) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r5, 0x7ffffc, 0x0) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfd14) write$cgroup_int(r5, &(0x7f0000000140), 0x12) openat2(r5, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x80000, 0x0, 0x3}, 0x18) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x4000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x125}}) 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x140}, 0x10}], 0x1}, 0x0) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x5000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0xec0}, 0x10}], 0x1}, 0x0) [ 204.409130][T17568] loop4: detected capacity change from 0 to 256 [ 204.422187][T17570] loop1: detected capacity change from 0 to 256 [ 204.430350][T17568] sctp: [Deprecated]: syz-executor.4 (pid 17568) Use of struct sctp_assoc_value in delayed_ack socket option. [ 204.430350][T17568] Use struct sctp_sack_info instead 15:49:52 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:52 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)={0x2, [0x0, 0x0]}, &(0x7f0000000280)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000002c0)={r1, 0x9}, 0x8) (async) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7d8ef4a0602dd28f2b3dfe8315448197bec8c84a8d28306b0e7b288d904a03197552b852cc43e9c8e7ab5c2915539cbc7b001ba3978bdf029f61d47c8c2facf157ef7b64c9a60d9328b2c842b10a4203e60864d42dda6da2cecae8a5abda46b1c3a4c47b684165caf4cbbbcdaaa6dfbd51f8aea907"], 0x81) (async) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0xc, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r4}, 0x8) (async) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300)={r4, 0x400}, &(0x7f0000000340)=0x8) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) open(&(0x7f0000000100)='./file0\x00', 0x230000, 0x110) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r5, 0x7ffffc, 0x0) (async) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfd14) write$cgroup_int(r5, &(0x7f0000000140), 0x12) (async) openat2(r5, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x80000, 0x0, 0x3}, 0x18) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x6000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xd000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x33fe0}, 0x10}], 0x1}, 0x0) 15:49:52 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x171}}) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x7000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0xfffffdef}, 0x10}], 0x1}, 0x0) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x8000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1}, 0x0) [ 204.551205][T17593] loop1: detected capacity change from 0 to 256 [ 204.551736][T17595] loop4: detected capacity change from 0 to 256 15:49:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xe000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:52 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x9000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 204.612099][T17595] sctp: [Deprecated]: syz-executor.4 (pid 17595) Use of struct sctp_assoc_value in delayed_ack socket option. [ 204.612099][T17595] Use struct sctp_sack_info instead 15:49:52 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)={0x2, [0x0, 0x0]}, &(0x7f0000000280)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000002c0)={r1, 0x9}, 0x8) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7d8ef4a0602dd28f2b3dfe8315448197bec8c84a8d28306b0e7b288d904a03197552b852cc43e9c8e7ab5c2915539cbc7b001ba3978bdf029f61d47c8c2facf157ef7b64c9a60d9328b2c842b10a4203e60864d42dda6da2cecae8a5abda46b1c3a4c47b684165caf4cbbbcdaaa6dfbd51f8aea907"], 0x81) r2 = socket(0xa, 0x1, 0x0) close(r2) (async) close(r2) socket$inet6_sctp(0xa, 0x5, 0x84) (async) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0xc, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) (async) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0xc, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r4}, 0x8) (async) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300)={r4, 0x400}, &(0x7f0000000340)=0x8) (async) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300)={r4, 0x400}, &(0x7f0000000340)=0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x230000, 0x110) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r5, 0x7ffffc, 0x0) (async) lseek(r5, 0x7ffffc, 0x0) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfd14) write$cgroup_int(r5, &(0x7f0000000140), 0x12) openat2(r5, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x80000, 0x0, 0x3}, 0x18) 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2}, 0x10}], 0x1}, 0x0) 15:49:52 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x18e}}) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xa000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x3}, 0x10}], 0x1}, 0x0) [ 204.677366][T17617] loop1: detected capacity change from 0 to 256 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4}, 0x10}], 0x1}, 0x0) 15:49:52 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x1b2}}) 15:49:52 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xb000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xf000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 204.737723][T17627] loop4: detected capacity change from 0 to 256 [ 204.805968][T17644] sctp: [Deprecated]: syz-executor.4 (pid 17644) Use of struct sctp_assoc_value in delayed_ack socket option. [ 204.805968][T17644] Use struct sctp_sack_info instead [ 204.807210][T17643] xt_ct_set_timeout: 77 callbacks suppressed [ 204.807226][T17643] xt_CT: You must specify a L4 protocol and not use inversions on it [ 204.829526][T17646] sctp: [Deprecated]: syz-executor.4 (pid 17646) Use of struct sctp_assoc_value in delayed_ack socket option. [ 204.829526][T17646] Use struct sctp_sack_info instead 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xc000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x4, 0x81, 0x0, 0x80000000, 0x30, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x763, 0x7800, 0x8, 0x20}}) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x1}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x24, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0xb}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8040}, 0x4000010) 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5}, 0x10}], 0x1}, 0x0) [ 204.832880][T17647] loop1: detected capacity change from 0 to 256 15:49:52 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x1d2}}) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xd000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:52 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:52 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x4, 0x81, 0x0, 0x80000000, 0x30, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x763, 0x7800, 0x8, 0x20}}) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x1}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x24, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0xb}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8040}, 0x4000010) 15:49:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xfffffff, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 204.875145][T17651] xt_CT: You must specify a L4 protocol and not use inversions on it [ 204.886913][T17654] loop4: detected capacity change from 0 to 256 [ 204.902313][T17652] selinux_netlink_send: 45 callbacks suppressed [ 204.902326][T17652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=17652 comm=syz-executor.2 15:49:52 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x21a}}) 15:49:52 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:52 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x4, 0x81, 0x0, 0x80000000, 0x30, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x763, 0x7800, 0x8, 0x20}}) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x1}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x24, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0xb}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8040}, 0x4000010) 15:49:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x10000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xe000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 204.970626][T17664] loop4: detected capacity change from 0 to 256 [ 204.975151][T17666] loop1: detected capacity change from 0 to 256 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x6}, 0x10}], 0x1}, 0x0) 15:49:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x10000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 205.007240][T17668] xt_CT: You must specify a L4 protocol and not use inversions on it [ 205.039639][T17672] xt_CT: You must specify a L4 protocol and not use inversions on it [ 205.065138][T17681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=17681 comm=syz-executor.2 15:49:52 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x29c}}) 15:49:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x7}, 0x10}], 0x1}, 0x0) 15:49:52 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x11000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 205.096081][T17676] loop4: detected capacity change from 0 to 256 [ 205.127051][T17688] xt_CT: You must specify a L4 protocol and not use inversions on it [ 205.127363][T17685] loop1: detected capacity change from 0 to 256 15:49:53 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x1c}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000140)=0x0) sendmsg$NFC_CMD_FW_DOWNLOAD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x5c, r4, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0x17, 0x14, 'cgroup.controllers\x00'}, @NFC_ATTR_FIRMWARE_NAME={0x9, 0x14, '.\\{+&'}, @NFC_ATTR_FIRMWARE_NAME={0xa, 0x14, 'nodots'}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000801}, 0x40044) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:53 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x11000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:53 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 205.174980][T17692] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=17692 comm=syz-executor.2 [ 205.201973][T17699] xt_CT: You must specify a L4 protocol and not use inversions on it [ 205.208494][T17701] loop4: detected capacity change from 0 to 256 15:49:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x8}, 0x10}], 0x1}, 0x0) 15:49:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x12000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:53 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x2b8}}) [ 205.230460][T17703] loop1: detected capacity change from 0 to 256 15:49:53 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x12000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x13020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:53 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x74, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x16000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 205.277447][T17707] xt_CT: You must specify a L4 protocol and not use inversions on it [ 205.281318][T17715] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=17715 comm=syz-executor.2 15:49:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x25000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x9}, 0x10}], 0x1}, 0x0) [ 205.318210][T17719] xt_CT: You must specify a L4 protocol and not use inversions on it [ 205.335193][T17723] loop1: detected capacity change from 0 to 256 [ 205.350032][T17727] xt_CT: You must specify a L4 protocol and not use inversions on it [ 205.383192][T17730] xt_CT: You must specify a L4 protocol and not use inversions on it [ 205.392167][T17731] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=17731 comm=syz-executor.2 15:49:53 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x1c}}, 0x0) (async) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x1c}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000140)=0x0) sendmsg$NFC_CMD_FW_DOWNLOAD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x5c, r4, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0x17, 0x14, 'cgroup.controllers\x00'}, @NFC_ATTR_FIRMWARE_NAME={0x9, 0x14, '.\\{+&'}, @NFC_ATTR_FIRMWARE_NAME={0xa, 0x14, 'nodots'}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000801}, 0x40044) (async) sendmsg$NFC_CMD_FW_DOWNLOAD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x5c, r4, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0x17, 0x14, 'cgroup.controllers\x00'}, @NFC_ATTR_FIRMWARE_NAME={0x9, 0x14, '.\\{+&'}, @NFC_ATTR_FIRMWARE_NAME={0xa, 0x14, 'nodots'}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000801}, 0x40044) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:53 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x2e4}}) 15:49:53 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x13000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x25010000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:53 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0xa}, 0x10}], 0x1}, 0x0) 15:49:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x38010000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:53 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x20000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x3a020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0xb}, 0x10}], 0x1}, 0x0) 15:49:53 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x300}}) [ 206.072029][T17741] loop1: detected capacity change from 0 to 256 [ 206.087348][T17737] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=17737 comm=syz-executor.2 [ 206.107523][T17746] loop4: detected capacity change from 0 to 256 15:49:54 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 206.144280][T17752] loop1: detected capacity change from 0 to 256 [ 206.152114][T17755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=17755 comm=syz-executor.2 15:49:54 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x1c}}, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000140)=0x0) sendmsg$NFC_CMD_FW_DOWNLOAD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x5c, r4, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0x17, 0x14, 'cgroup.controllers\x00'}, @NFC_ATTR_FIRMWARE_NAME={0x9, 0x14, '.\\{+&'}, @NFC_ATTR_FIRMWARE_NAME={0xa, 0x14, 'nodots'}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000801}, 0x40044) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0xc}, 0x10}], 0x1}, 0x0) 15:49:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x3e030000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:54 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x20100000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:54 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:54 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x39c}}) 15:49:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x48000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0xd}, 0x10}], 0x1}, 0x0) [ 206.941757][T17775] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12 sclass=netlink_route_socket pid=17775 comm=syz-executor.2 [ 206.956769][T17777] loop1: detected capacity change from 0 to 256 [ 206.962618][T17780] loop4: detected capacity change from 0 to 256 15:49:54 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x500}}) 15:49:54 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x22000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:54 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0xaa, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0xe}, 0x10}], 0x1}, 0x0) 15:49:54 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fgetxattr(r1, &(0x7f0000000140)=@known='trusted.overlay.redirect\x00', &(0x7f0000000180)=""/12, 0xc) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r2, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) fchown(r2, 0xee00, 0xffffffffffffffff) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) r3 = accept$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000240)=0x1c) fremovexattr(r3, &(0x7f00000002c0)=@random={'trusted.', 'nodots'}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x48020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 207.001273][T17790] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=13 sclass=netlink_route_socket pid=17790 comm=syz-executor.2 [ 207.038876][T17795] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14 sclass=netlink_route_socket pid=17795 comm=syz-executor.2 15:49:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0xf}, 0x10}], 0x1}, 0x0) 15:49:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x4c000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:54 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:54 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fgetxattr(r1, &(0x7f0000000140)=@known='trusted.overlay.redirect\x00', &(0x7f0000000180)=""/12, 0xc) (async) fgetxattr(r1, &(0x7f0000000140)=@known='trusted.overlay.redirect\x00', &(0x7f0000000180)=""/12, 0xc) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r2, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) fchown(r2, 0xee00, 0xffffffffffffffff) (async) fchown(r2, 0xee00, 0xffffffffffffffff) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) r3 = accept$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000240)=0x1c) fremovexattr(r3, &(0x7f00000002c0)=@random={'trusted.', 'nodots'}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x10}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x4d000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 207.072568][T17803] loop4: detected capacity change from 0 to 256 [ 207.109819][T17801] loop1: detected capacity change from 0 to 256 15:49:55 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x600}}) 15:49:55 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x25000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x5a030000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x11}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fgetxattr(r1, &(0x7f0000000140)=@known='trusted.overlay.redirect\x00', &(0x7f0000000180)=""/12, 0xc) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) (async) sendmsg$rds(r2, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) fchown(r2, 0xee00, 0xffffffffffffffff) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) r3 = accept$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000240)=0x1c) fremovexattr(r3, &(0x7f00000002c0)=@random={'trusted.', 'nodots'}) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 207.169244][T17816] loop4: detected capacity change from 0 to 256 15:49:55 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0xc1, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x12}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x700}}) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x5c8f0200], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x60020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x13}, 0x10}], 0x1}, 0x0) [ 207.241006][T17830] loop1: detected capacity change from 0 to 256 [ 207.267068][T17836] loop4: detected capacity change from 0 to 256 15:49:55 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x3f000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:55 executing program 4: getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), &(0x7f0000000180)=0x4) r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0x4010, r1, 0x800000) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getdents(r0, &(0x7f00000000c0)=""/62, 0x3e) socket$nl_route(0x10, 0x3, 0x0) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x65030000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x14}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0xec, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x15}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x68000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x900}}) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x6c000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 4: getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), &(0x7f0000000180)=0x4) r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0x4010, r1, 0x800000) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getdents(r0, &(0x7f00000000c0)=""/62, 0x3e) socket$nl_route(0x10, 0x3, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), &(0x7f0000000180)=0x4) (async) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0x4010, r1, 0x800000) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) getdents(r0, &(0x7f00000000c0)=""/62, 0x3e) (async) socket$nl_route(0x10, 0x3, 0x0) (async) [ 207.377422][T17857] loop4: detected capacity change from 0 to 256 [ 207.377539][T17856] loop1: detected capacity change from 0 to 256 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x16}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x40000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x18}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x71010000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xa00}}) 15:49:55 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x19}, 0x10}], 0x1}, 0x0) [ 207.461275][T17874] loop4: detected capacity change from 0 to 256 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x74000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 4: getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), &(0x7f0000000180)=0x4) (async) r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0x4010, r1, 0x800000) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) getdents(r0, &(0x7f00000000c0)=""/62, 0x3e) socket$nl_route(0x10, 0x3, 0x0) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1a}, 0x10}], 0x1}, 0x0) [ 207.518386][T17884] loop1: detected capacity change from 0 to 256 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x7a000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1c}, 0x10}], 0x1}, 0x0) [ 207.570546][T17899] loop4: detected capacity change from 0 to 256 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1d}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xad9}}) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x86020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646574732c5e7f646f74732c2a534fb099065fbd6b9550875dec636865636b3d72656c617865642cf3c239e1f1f40642217517a100"], 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) fremovexattr(r0, &(0x7f00000004c0)=@known='security.apparmor\x00') r2 = signalfd(r1, &(0x7f00000000c0)={[0xfffffffff7ffffe1]}, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) r4 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r3, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r4}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r3}, 0x20) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r5, 0x7ffffc, 0x0) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfd14) write$cgroup_int(r5, &(0x7f0000000140), 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xb, &(0x7f0000000200)=@raw=[@map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_idx={0x18, 0xb, 0x5, 0x0, 0xe}, @alu={0x7, 0x1, 0x6, 0xf186b7014a2bb4ec, 0x4, 0xfffffffffffffffc, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x0, 0x1, 0xa, 0x0, 0xfffffffffffffff0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_fd={0x18, 0x7, 0x1, 0x0, r3}], &(0x7f00000002c0)='syzkaller\x00', 0xebc6, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0xd55, 0xfffffffe}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000380)=[r0], &(0x7f00000003c0)=[{0x2, 0x3, 0xa}], 0x10, 0x9}, 0x90) 15:49:55 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x50000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:55 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1e}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x8e010000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x96000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x21}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x98000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 207.674225][T17913] loop4: detected capacity change from 0 to 256 [ 207.695921][T17913] FAT-fs (loop4): Unrecognized mount option "nodets" or missing value [ 207.710165][T17920] loop1: detected capacity change from 0 to 256 15:49:55 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:55 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x8cffffff, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:55 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xaff}}) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x22}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646574732c5e7f646f74732c2a534fb099065fbd6b9550875dec636865636b3d72656c617865642cf3c239e1f1f40642217517a100"], 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) fremovexattr(r0, &(0x7f00000004c0)=@known='security.apparmor\x00') (async) r2 = signalfd(r1, &(0x7f00000000c0)={[0xfffffffff7ffffe1]}, 0x8) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) (async) r4 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) (async, rerun: 64) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r3, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r4}, 0x20) (async, rerun: 64) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r3}, 0x20) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r5, 0x7ffffc, 0x0) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfd14) write$cgroup_int(r5, &(0x7f0000000140), 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xb, &(0x7f0000000200)=@raw=[@map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_idx={0x18, 0xb, 0x5, 0x0, 0xe}, @alu={0x7, 0x1, 0x6, 0xf186b7014a2bb4ec, 0x4, 0xfffffffffffffffc, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x0, 0x1, 0xa, 0x0, 0xfffffffffffffff0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_fd={0x18, 0x7, 0x1, 0x0, r3}], &(0x7f00000002c0)='syzkaller\x00', 0xebc6, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0xd55, 0xfffffffe}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000380)=[r0], &(0x7f00000003c0)=[{0x2, 0x3, 0xa}], 0x10, 0x9}, 0x90) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x9c030000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x24}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xb00}}) 15:49:55 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0x9e000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 207.826872][T17946] loop1: detected capacity change from 0 to 256 [ 207.827746][T17943] loop4: detected capacity change from 0 to 256 15:49:55 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xc0ed0000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:55 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646574732c5e7f646f74732c2a534fb099065fbd6b9550875dec636865636b3d72656c617865642cf3c239e1f1f40642217517a100"], 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) (async) fremovexattr(r0, &(0x7f00000004c0)=@known='security.apparmor\x00') r2 = signalfd(r1, &(0x7f00000000c0)={[0xfffffffff7ffffe1]}, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) (async) r4 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r3, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r4}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r3}, 0x20) (async) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r5, 0x7ffffc, 0x0) (async) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfd14) (async) write$cgroup_int(r5, &(0x7f0000000140), 0x12) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xb, &(0x7f0000000200)=@raw=[@map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_idx={0x18, 0xb, 0x5, 0x0, 0xe}, @alu={0x7, 0x1, 0x6, 0xf186b7014a2bb4ec, 0x4, 0xfffffffffffffffc, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x0, 0x1, 0xa, 0x0, 0xfffffffffffffff0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_fd={0x18, 0x7, 0x1, 0x0, r3}], &(0x7f00000002c0)='syzkaller\x00', 0xebc6, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0xd55, 0xfffffffe}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000380)=[r0], &(0x7f00000003c0)=[{0x2, 0x3, 0xa}], 0x10, 0x9}, 0x90) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x25}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xaa000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x26}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xc1000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:55 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f578a219f"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x2) [ 207.950533][T17962] loop4: detected capacity change from 0 to 256 [ 207.958814][T17966] loop1: detected capacity change from 0 to 256 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x28}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xc00}}) 15:49:55 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xe5ffffff, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x29}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xca000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2a}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:55 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xd00}}) 15:49:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xd0010000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:55 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f578a219f"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x2) 15:49:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2c}, 0x10}], 0x1}, 0x0) 15:49:55 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xf0ffffff, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 208.072337][T17984] loop1: detected capacity change from 0 to 256 [ 208.094852][T17991] loop4: detected capacity change from 0 to 256 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xd2010000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2d}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2e}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xe00}}) 15:49:56 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f578a219f"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x2) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f578a219f"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x2) (async) 15:49:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xf6ffffff, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 208.175768][T18004] loop4: detected capacity change from 0 to 256 [ 208.186085][T18007] loop1: detected capacity change from 0 to 256 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xd7020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x30}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xd9000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x31}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xe4020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xf9fdffff, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 208.273998][T18021] loop4: detected capacity change from 0 to 256 [ 208.297774][T18026] loop1: detected capacity change from 0 to 256 15:49:56 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x1100}}) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xe8120000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x32}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xec000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x1200}}) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x34}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xfeffffff, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 208.416611][T18043] loop1: detected capacity change from 0 to 256 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xec020000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x3a}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xff030000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [0x0, 0x0, 0x0, 0xfc000000], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 208.481435][T18056] loop1: detected capacity change from 0 to 256 15:49:56 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x1a02}}) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x3e}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="085144a653692ee7301fdc19192998eaa70731f6099bd9d98f318f632fa2758b680ae15ce0a680c093209d87a8d8a85ca8d483e27321b0729031b2ad77b8c9d5d9989a22c6beb6a81e2bfb117c3750e503ef03717642cc1171f887977e0042ef88347aaaaccdb5ebb12328a93045761e05afd144ef6117d42e39f21c366a35034b87ec8aa6"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)) close(r2) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r2) fdatasync(r0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r4) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r6 = dup3(r4, r4, 0x80000) ioctl$AUTOFS_IOC_PROTOVER(r6, 0x80049363, &(0x7f00000002c0)) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c040000", @ANYRES16=r5, @ANYBLOB="5f0208000300", @ANYRES32=r7, @ANYBLOB="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"], 0x43c}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) sendmsg$NL80211_CMD_SET_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x4c, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x1, 0x7f}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 15:49:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xfff7ffff, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x2}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x42}, 0x10}], 0x1}, 0x0) [ 208.564458][T18066] loop1: detected capacity change from 0 to 256 15:49:56 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x3}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x43}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x2000}}) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x4}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 208.616776][T18077] loop4: detected capacity change from 0 to 256 [ 208.641607][T18083] loop1: detected capacity change from 0 to 256 15:49:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xffff0300, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x48}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="085144a653692ee7301fdc19192998eaa70731f6099bd9d98f318f632fa2758b680ae15ce0a680c093209d87a8d8a85ca8d483e27321b0729031b2ad77b8c9d5d9989a22c6beb6a81e2bfb117c3750e503ef03717642cc1171f887977e0042ef88347aaaaccdb5ebb12328a93045761e05afd144ef6117d42e39f21c366a35034b87ec8aa6"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)) close(r2) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r2) fdatasync(r0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r4) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r6 = dup3(r4, r4, 0x80000) ioctl$AUTOFS_IOC_PROTOVER(r6, 0x80049363, &(0x7f00000002c0)) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c040000", @ANYRES16=r5, @ANYBLOB="5f0208000300", @ANYRES32=r7, @ANYBLOB="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"], 0x43c}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) sendmsg$NL80211_CMD_SET_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x4c, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x1, 0x7f}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="085144a653692ee7301fdc19192998eaa70731f6099bd9d98f318f632fa2758b680ae15ce0a680c093209d87a8d8a85ca8d483e27321b0729031b2ad77b8c9d5d9989a22c6beb6a81e2bfb117c3750e503ef03717642cc1171f887977e0042ef88347aaaaccdb5ebb12328a93045761e05afd144ef6117d42e39f21c366a35034b87ec8aa6"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)) (async) close(r2) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r2) (async) fdatasync(r0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r4) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) (async) dup3(r4, r4, 0x80000) (async) ioctl$AUTOFS_IOC_PROTOVER(r6, 0x80049363, &(0x7f00000002c0)) (async) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) (async) sendmsg$NL80211_CMD_FRAME(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c040000", @ANYRES16=r5, @ANYBLOB="5f0208000300", @ANYRES32=r7, @ANYBLOB="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"], 0x43c}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) (async) sendmsg$NL80211_CMD_SET_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x4c, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x1, 0x7f}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) (async) 15:49:56 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x2400}}) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x5}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x49}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x6}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 208.764385][T18103] loop1: detected capacity change from 0 to 256 15:49:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xffff1f00, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4a}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x7}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x2501}}) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4c}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xfffff7ff, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 208.827485][T18112] loop4: detected capacity change from 0 to 256 [ 208.858216][T18119] loop1: detected capacity change from 0 to 256 15:49:56 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="085144a653692ee7301fdc19192998eaa70731f6099bd9d98f318f632fa2758b680ae15ce0a680c093209d87a8d8a85ca8d483e27321b0729031b2ad77b8c9d5d9989a22c6beb6a81e2bfb117c3750e503ef03717642cc1171f887977e0042ef88347aaaaccdb5ebb12328a93045761e05afd144ef6117d42e39f21c366a35034b87ec8aa6"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)) (async) close(r2) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r2) fdatasync(r0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r4) (async) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) (async) r6 = dup3(r4, r4, 0x80000) ioctl$AUTOFS_IOC_PROTOVER(r6, 0x80049363, &(0x7f00000002c0)) (async) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c040000", @ANYRES16=r5, @ANYBLOB="5f0208000300", @ANYRES32=r7, @ANYBLOB="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"], 0x43c}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) (async) sendmsg$NL80211_CMD_SET_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x4c, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x1, 0x7f}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 15:49:56 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:56 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x2a00}}) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4e}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x8}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xfffffdf9, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x9}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 208.947739][T18134] loop1: detected capacity change from 0 to 256 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4f}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0xa}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 209.025282][T18152] loop1: detected capacity change from 0 to 256 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x50}, 0x10}], 0x1}, 0x0) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0xb}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f2e578656dab42372ee8424f739749bced9a4045e16fc7b526794b5edf5139f03ad484fbfb5d93384f900"/58], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xffffff0f, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:56 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x2f00}}) 15:49:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0xc}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x51}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x52}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0xd}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xffffff7f, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:57 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async, rerun: 32) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (rerun: 32) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f2e578656dab42372ee8424f739749bced9a4045e16fc7b526794b5edf5139f03ad484fbfb5d93384f900"/58], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 209.139240][T18176] loop4: detected capacity change from 0 to 256 [ 209.144867][T18175] loop1: detected capacity change from 0 to 256 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0xe}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:57 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x54}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x3a00}}) 15:49:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xffffff8c, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 209.229327][T18193] loop4: detected capacity change from 0 to 256 [ 209.238579][T18191] loop1: detected capacity change from 0 to 256 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x10}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x55}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f2e578656dab42372ee8424f739749bced9a4045e16fc7b526794b5edf5139f03ad484fbfb5d93384f900"/58], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f2e578656dab42372ee8424f739749bced9a4045e16fc7b526794b5edf5139f03ad484fbfb5d93384f900"/58], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x56}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:57 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x3f00}}) 15:49:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xffffffe5, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x11}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x58}, 0x10}], 0x1}, 0x0) [ 209.336554][T18209] loop1: detected capacity change from 0 to 256 [ 209.371867][ T4131] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x12}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xfffffff0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x59}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x16}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 209.427118][T18222] loop1: detected capacity change from 0 to 256 [ 209.430635][T18223] loop4: detected capacity change from 0 to 256 15:49:57 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {@fat=@check_normal}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/mnt\x00') write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1], 0x81) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)=ANY=[@ANYBLOB="810000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000140)=0x1f, 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f0000000180)={0xc17, 0x7292, 0x0, 0x2, 0x2, 0x3}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:57 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x4000}}) 15:49:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xfffffff6, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x25}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5a}, 0x10}], 0x1}, 0x0) [ 209.491922][T18236] loop1: detected capacity change from 0 to 256 [ 209.532001][T18243] loop4: detected capacity change from 0 to 256 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x48}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:57 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:57 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {@fat=@check_normal}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/mnt\x00') (async) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/mnt\x00') write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1], 0x81) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)=ANY=[@ANYBLOB="810000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000140)=0x1f, 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f0000000180)={0xc17, 0x7292, 0x0, 0x2, 0x2, 0x3}) (async) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f0000000180)={0xc17, 0x7292, 0x0, 0x2, 0x2, 0x3}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xfffffffe, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:57 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x4800}}) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5c}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x4c}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 209.581182][T18249] loop1: detected capacity change from 0 to 256 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5e}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x4d}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:57 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5f}, 0x10}], 0x1}, 0x0) [ 209.659531][T18264] loop1: detected capacity change from 0 to 256 [ 209.674258][T18268] loop4: detected capacity change from 0 to 256 15:49:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x8000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:57 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x4a00}}) 15:49:57 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {@fat=@check_normal}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async, rerun: 64) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/mnt\x00') write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1], 0x81) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)=ANY=[@ANYBLOB="810000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) (rerun: 64) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000140)=0x1f, 0x4) (async, rerun: 32) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async, rerun: 32) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f0000000180)={0xc17, 0x7292, 0x0, 0x2, 0x2, 0x3}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x60}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x68}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x64}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x6c}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:57 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f2457d3865600000000"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:57 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x4c00}}) [ 209.771376][T18289] loop1: detected capacity change from 0 to 256 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x65}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xedc000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x74}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 209.847403][T18305] xt_ct_set_timeout: 58 callbacks suppressed [ 209.847421][T18305] xt_CT: You must specify a L4 protocol and not use inversions on it [ 209.863259][T18306] loop4: detected capacity change from 0 to 256 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x66}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x2000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x7a}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:57 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:57 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f2457d3865600000000"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 209.893535][T18313] loop1: detected capacity change from 0 to 256 15:49:57 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x4d00}}) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x68}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x96}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x69}, 0x10}], 0x1}, 0x0) [ 209.903982][T18314] xt_CT: You must specify a L4 protocol and not use inversions on it [ 209.958675][T18321] xt_CT: You must specify a L4 protocol and not use inversions on it [ 209.962562][T18323] loop4: detected capacity change from 0 to 256 [ 209.983206][T18327] loop1: detected capacity change from 0 to 256 15:49:57 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x6800}}) 15:49:57 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x4000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:57 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f2457d3865600000000"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x6a}, 0x10}], 0x1}, 0x0) [ 210.028853][ T3425] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 15:49:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x98}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x6c}, 0x10}], 0x1}, 0x0) 15:49:57 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="af12284662be120a93e609d5ed56b8e70ab87d05fc33f017e3f2290273a1c8ce90aa012e9957087d2cb2309148a6b5b62bc503921cd3d0fbd812d72aefd47bc6bcbd043a2cc543f3b8ff4bc33fc59c7284d4e211ea21722e9d"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 210.082142][T18345] loop1: detected capacity change from 0 to 256 [ 210.089453][T18338] xt_CT: You must specify a L4 protocol and not use inversions on it [ 210.092403][T18347] loop4: detected capacity change from 0 to 256 15:49:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x10000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:57 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0x9e}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x6c00}}) 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x6d}, 0x10}], 0x1}, 0x0) 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x70}, 0x10}], 0x1}, 0x0) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0xaa}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x7101}}) [ 210.136565][T18352] xt_CT: You must specify a L4 protocol and not use inversions on it [ 210.184217][T18359] loop1: detected capacity change from 0 to 256 [ 210.194693][T18365] loop4: detected capacity change from 0 to 256 15:49:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x20000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:58 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="af12284662be120a93e609d5ed56b8e70ab87d05fc33f017e3f2290273a1c8ce90aa012e9957087d2cb2309148a6b5b62bc503921cd3d0fbd812d72aefd47bc6bcbd043a2cc543f3b8ff4bc33fc59c7284d4e211ea21722e9d"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="af12284662be120a93e609d5ed56b8e70ab87d05fc33f017e3f2290273a1c8ce90aa012e9957087d2cb2309148a6b5b62bc503921cd3d0fbd812d72aefd47bc6bcbd043a2cc543f3b8ff4bc33fc59c7284d4e211ea21722e9d"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x71}, 0x10}], 0x1}, 0x0) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0xc1}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 210.201719][T18363] xt_CT: You must specify a L4 protocol and not use inversions on it 15:49:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x7300}}) 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x72}, 0x10}], 0x1}, 0x0) 15:49:58 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x74, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0xca}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x100000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x7400}}) [ 210.272002][T18376] xt_CT: You must specify a L4 protocol and not use inversions on it [ 210.328607][T18388] loop1: detected capacity change from 0 to 256 [ 210.342362][T18389] xt_CT: You must specify a L4 protocol and not use inversions on it [ 210.349079][T18384] loop4: detected capacity change from 0 to 256 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x74}, 0x10}], 0x1}, 0x0) 15:49:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="af12284662be120a93e609d5ed56b8e70ab87d05fc33f017e3f2290273a1c8ce90aa012e9957087d2cb2309148a6b5b62bc503921cd3d0fbd812d72aefd47bc6bcbd043a2cc543f3b8ff4bc33fc59c7284d4e211ea21722e9d"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0xd9}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0xec}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x75}, 0x10}], 0x1}, 0x0) [ 210.406078][T18400] xt_CT: You must specify a L4 protocol and not use inversions on it [ 210.418834][T18402] loop1: detected capacity change from 0 to 256 15:49:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x200000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {0xfc}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x7a00}}) [ 210.463234][T18413] xt_CT: You must specify a L4 protocol and not use inversions on it [ 210.491735][T18417] loop4: detected capacity change from 0 to 256 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x200040, &(0x7f0000000140)={[{@dots}, {@dots}, {@fat=@dos1xfloppy}], [{@subj_role={'subj_role', 0x3d, '[\'#-'}}]}, 0x2, 0x199, &(0x7f0000000200)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x76}, 0x10}], 0x1}, 0x0) 15:49:58 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 210.538158][T18426] loop1: detected capacity change from 0 to 256 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x2}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x78}, 0x10}], 0x1}, 0x0) 15:49:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x204000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x8e01}}) [ 210.592259][T18437] loop4: detected capacity change from 0 to 256 [ 210.618100][T18437] FAT-fs (loop4): Unrecognized mount option "subj_role=['#-" or missing value 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x3}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x4}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x79}, 0x10}], 0x1}, 0x0) 15:49:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x300000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 210.649386][T18447] loop1: detected capacity change from 0 to 256 15:49:58 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x200040, &(0x7f0000000140)={[{@dots}, {@dots}, {@fat=@dos1xfloppy}], [{@subj_role={'subj_role', 0x3d, '[\'#-'}}]}, 0x2, 0x199, &(0x7f0000000200)="$eJzs3c/qElEUB/CjmQ5tchdEi4E2raR6AiMMooGgcFGrAmujEeRmamVv0QP2AOHK3YRNOf1E+YGg45/PZ+OB771w7sI7qznz7t6n8ejz9OPPOz8iSRrR7Ec/Fo3oRjP+mQUAcE4WRRG/ilLdvQAAh+H5DwCX5/Wbty+eZNngVZomEfNZPsyH5W+ZP3ueDR6mf3SrXfM8H95Y5Y/KPL2a34xbf/PHG/N2PLhf5svs6ctsLe/EaP/HBwAAAAAAAAAAAAAAAAAAAACAWvTSlY3zfXq9bXlZ/TcfaG1+Tyvutg52DAAAAAAAAAAAAAAAAAAAADhp06/fxu8nkw9fLr4obh9FG8siOY42TrdIj6ONSey2vR0R1y9uVGu+b1mz/Ifv2nx1R3RqvJ8AAAAAAAAAAAAAAAAAAOCSVC/91t0JAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANSn+v7//oq6zwgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMD5+x0AAP//qDkyVw==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x9c02}}) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x5}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x7a}, 0x10}], 0x1}, 0x0) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x6}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0xaa, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x400000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x7}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 210.724967][T18456] loop1: detected capacity change from 0 to 256 [ 210.754022][T18463] loop4: detected capacity change from 0 to 256 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x289}, 0x10}], 0x1}, 0x0) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x8}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x9c03}}) [ 210.816972][T18463] FAT-fs (loop4): Unrecognized mount option "subj_role=['#-" or missing value [ 210.846468][T18481] loop1: detected capacity change from 0 to 256 [ 210.853428][T18482] selinux_netlink_send: 2 callbacks suppressed 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x9}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x200040, &(0x7f0000000140)={[{@dots}, {@dots}, {@fat=@dos1xfloppy}], [{@subj_role={'subj_role', 0x3d, '[\'#-'}}]}, 0x2, 0x199, &(0x7f0000000200)="$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") (async, rerun: 32) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (rerun: 32) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x300}, 0x10}], 0x1}, 0x0) 15:49:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xaa00}}) [ 210.853444][T18482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=649 sclass=netlink_route_socket pid=18482 comm=syz-executor.2 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0xa}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x500000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0xb}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0xc}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x500}, 0x10}], 0x1}, 0x0) [ 210.919370][T18495] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=768 sclass=netlink_route_socket pid=18495 comm=syz-executor.2 [ 210.946689][T18499] loop4: detected capacity change from 0 to 256 15:49:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xb201}}) 15:49:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x8) write$P9_RUNLINKAT(r1, &(0x7f00000000c0)={0x7, 0x4d, 0x5}, 0x7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0xd}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0xc1, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x543}, 0x10}], 0x1}, 0x0) 15:49:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x600000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 211.023028][T18513] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=18513 comm=syz-executor.2 [ 211.028213][T18512] loop1: detected capacity change from 0 to 256 15:49:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0xe}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:58 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0xec, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xb600}}) 15:49:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x604000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x10}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x600}, 0x10}], 0x1}, 0x0) 15:49:59 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x8) write$P9_RUNLINKAT(r1, &(0x7f00000000c0)={0x7, 0x4d, 0x5}, 0x7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) creat(&(0x7f0000000100)='./bus\x00', 0x0) (async) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x8) (async) write$P9_RUNLINKAT(r1, &(0x7f00000000c0)={0x7, 0x4d, 0x5}, 0x7) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) [ 211.079693][T18520] loop4: detected capacity change from 0 to 256 [ 211.090150][T18523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1347 sclass=netlink_route_socket pid=18523 comm=syz-executor.2 [ 211.111353][T18525] loop1: detected capacity change from 0 to 256 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x11}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x608}, 0x10}], 0x1}, 0x0) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x12}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 211.192624][T18536] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1536 sclass=netlink_route_socket pid=18536 comm=syz-executor.2 [ 211.209287][T18540] loop1: detected capacity change from 0 to 256 [ 211.214122][T18541] loop4: detected capacity change from 0 to 256 15:49:59 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x8) write$P9_RUNLINKAT(r1, &(0x7f00000000c0)={0x7, 0x4d, 0x5}, 0x7) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:59 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x700000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:59 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xb802}}) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x16}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x689}, 0x10}], 0x1}, 0x0) [ 211.301011][T18553] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1544 sclass=netlink_route_socket pid=18553 comm=syz-executor.2 [ 211.320173][T18559] loop4: detected capacity change from 0 to 256 [ 211.326209][T18560] loop1: detected capacity change from 0 to 256 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x25}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x800000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:59 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:59 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfd14) write$cgroup_int(r2, &(0x7f0000000140), 0x12) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r4 = signalfd4(r0, &(0x7f0000000380)={[0x2]}, 0x8, 0x80800) r5 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x200000, 0x102) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) r7 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000780)={0x1, 0x0, 0x1000, 0x3b, &(0x7f0000000540)="fd597dea24280a420c94f41bc668a6d721943649ad0674c0c9043b2125be5af8d9f805544c24b98c3175ad74270028611c7c6d8dce1ebefffe6f15", 0x1000, 0x0, &(0x7f0000000ac0)="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"}) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r6, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r7}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r6}, 0x20) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) r9 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r9, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) bind$inet6(r9, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r8, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r9}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r8}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x8, &(0x7f00000000c0)=@raw=[@ldst={0x0, 0x3, 0x6, 0x2, 0xa, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @alu={0x4, 0x1, 0x7, 0x5, 0x3, 0x40, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r1}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x2}], &(0x7f0000000140)='syzkaller\x00', 0x453f, 0xd3, &(0x7f0000000200)=""/211, 0x8d03d9f9fa9063df, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000180)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xd, 0x7, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000400)=[r3, r1, r1, r4, r1, r5, r6, r1, 0x1, r8], &(0x7f0000000440)=[{0x2, 0x3, 0x2, 0x8}, {0x5, 0x4, 0xc, 0x8}]}, 0x90) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:59 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xc000}}) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x48}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x810000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:59 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xc100}}) 15:49:59 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x6c3}, 0x10}], 0x1}, 0x0) [ 211.421039][T18575] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1673 sclass=netlink_route_socket pid=18575 comm=syz-executor.2 [ 211.439486][T18571] loop1: detected capacity change from 0 to 256 [ 211.458161][T18577] loop4: detected capacity change from 0 to 256 15:49:59 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) (async) lseek(r2, 0x7ffffc, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfd14) (async) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfd14) write$cgroup_int(r2, &(0x7f0000000140), 0x12) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) signalfd4(r0, &(0x7f0000000380)={[0x2]}, 0x8, 0x80800) (async) r4 = signalfd4(r0, &(0x7f0000000380)={[0x2]}, 0x8, 0x80800) r5 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x200000, 0x102) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) r7 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) (async) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000780)={0x1, 0x0, 0x1000, 0x3b, &(0x7f0000000540)="fd597dea24280a420c94f41bc668a6d721943649ad0674c0c9043b2125be5af8d9f805544c24b98c3175ad74270028611c7c6d8dce1ebefffe6f15", 0x1000, 0x0, &(0x7f0000000ac0)="db4cb3ad2ecd03ba74bb0b813d6b62bcc1ef3af61c9e85bad74c30f1e03e8ae9f0b97535dd83f37ce1cb56313f8fdc102cab9370e2e04bee28cd7eeba3649e7abbe999ac78749f7eca28f485ca7778ca7e9e53ac477ffbeae803a3af6ab4d1ae8b1e92d2da74bd0ab53e5355aef6b0e805c38caf5fb0e134371bffbf539b076244080fd1fd19346371c72ac6d605fcdf79ddb0c29ace9e6e94cca41ceb1375e1e27a184d304833f2c0eb43379b4c9bbd5e9c8a02175d0413cc2de4dd47b7a771b9455f4481280d260eb782b9d51e684c21a76f981632d6157052af09854db1456da45ce043f17f5b03fb05b29369176159400c2107231a86601470e91c6f48fe6bfc236c7f422e5f9c10a90f9cd7067e4220d38d4bf02d2581f10b49d3f6f73ae613018f0215ebf7ebc78eb182d05b8a6e4409023fd16034f44d21749f4bbeb0dd917357569f14699890bc88b67a68bb523e8be60682e6751d17673cdac52acc1187739833a7f60a2f6a6e94a25be43a3b8fb140e8ebb614d8fd069cb2f52f601dc883481af825e24a40c6cae4567dc854b8704e86e401f145e535c4841ec4eb8a92f2963268bcc70674673570f5c77f474c9e515ed6b9161c978ad25c8f81970c5878564d8e6071c07368dd0fb5191d11009f836661bb9093c09b1dab81a154bce30ae0e2a95730c54fac6985db6f4faaf57743dfb012795848a0bb651495a9222ba737064ea9cee220fe2efca86e6ad4534f952d8f779c98efca6c7b82706fb93f7a5177701837678d860065995f9d1208a737d9b01c60b8b5ccc9d3a78fb683473c0f578bf51ac026c2cfe9c74be712f90ee1e425bed26896ffd136c2f4430805ebbab30a3d5b312899a4a83c81ecbc4b7e9037b862cd565f5b4fd22c44d5f4b0c48ec3dc6798df2f2f452b8e055c0cb139662865e64db0c92c6a2e83d138b1ee64e8c22662cb1a396aff3bfce94389de3f39152e52a4cbaa24d2ea42a4529eda1e79c51be06f546fed39c80d78865a9907d8062ec2978dbf32bc7916185d2621d29d9c9bc42c57be867222a8601a326ca6a5af8017ecfc696c987dfabc52cac243a78b12a3d2659b803c0701d1f346ac2dbe950b6275fbc6fe46e5a41928b03397d0bd3bb585541ba8a08be4cf911729d890844d85888a16960b4d16dfcc416fe8eb29580b1f5cbd685f32ea08e8f78f6944327212562f300fdf3e31c5b7e335668d2413845ae312a69ba93c403764dc9337aae02fbe4c3d716c9b9f7768ffbddb80a522b04e95e511de202eb7b21afeb3036023115ce501a4cf91ea3fe2ee800890053dcf7fdd6d52e2e4973f23773dd46a6ba99b7fe3817644c466c9fbcbfd7672e10b38820e3a3fc72dcf7cdfe1501a07647c30b96c5a0ba02ef86e954fdee122d02c110cd854891713f6df6d16967059819d8d0a128d820b90e793ebad2402d90d6b481e61649fdd8e447a049e6814a17d4528bf6aef6ddccc8999dd4cbe027b4cf67c23e963a40dfcffc22b284fb6fd3279cb4946f03854222c388c75220aba39dc7e4bd736801ce6bd6589c2b8b3c79b3bd16368fd78cd73c7942a139ec76f93db40f4772e5f0c87ad9b990a32cb931d9bb01c49ae7f211e1aacfa77de2e0aa8c218974bd23dd605fa3c8971a7f4b431c183680361aee585afe43afa560d0a8f563ed182a8d08d96ddd251dcfc61edb5c4103815dd3f88a5d9db472963f78775a804cda77c261f8046538547498dad2b43d98fe16a8911f472a47190a6dedee4cc1410e89ca0372e33547a4689450a88b77ac1d605beb89be42f915b7a7f327fe369a7447c8cbd077a2a1cc9ed5e1807601013c886368a1f329619dfbde1dabd5eb47c2f572836e9440ff477549609a90f8d0ae31c201d24145ce84dfaec5398f6a52207cd625bfc82476bf81cc7b93b50c87ab544cffe16a30f2f4b065f3eda3e0e36fee83980cf44bbdbd7415c5c7af6513cbb767444b1a0d54bcda10389ced3210438f24e0a05edacc4234f6fb2582e4ba2aee2de8bede5c77ef95a921e0c3ce1df266bc1e0cf8e98dcca639b3f7da2ac6d0292870fbe5c94b587438a86003a1ef34abc79e9c5e5104024bc9ba268a466510a19e8c2bff7af534222ca33d0dc926e74f349a940ab25bf6f44aa3f02f529fa118c6b31226e1642fa4f194b485736582f28e8a34fda08a6ce30e5eadc1b624c29bac15124d075f51940603f2440e21f4e084d63599c117869fac54656ed1721d73bf7562e58d95fd258766736bb1c665f6c3433140381737fbd536ef12500b8b08ad8f343906ef48ffbf6d425836f2ade54215d4291a8ae9860a8dd8403fd78266cc4050968220799d9bca952f7193ba06084704373ccfd9b849e3502991c68f5704770373e7921e62e0aa88ed67922d92ffec549526e8a36ac212e59dea049dd9e3935a864b9ac7a91d32f1bbd97249b619f0ebc5af69ee753d6a721b05768a1cadd970372df881e52c64365803cb22448f0eebcfb8120fa37d6fcf5544495d022d8cf5925e61f167c4e3a9540c7aba2e119020ef4c0f33f5c3ccf0f588f4b356eb18d7c2a22310ac6b85a93e1e80ac94fda41987756bc3fa7ee8b83fdcfc48ad71941d6fe0da21f48d8a9136bfe00bd7773268a82d220e81863fe1eb07df26c1d25d0184495dcedfef0d3515acd44343c47e06d6dac37e2ed14fd35359737b015de408fd9aa876b7a3a653b38802dd04ea2ae49195c995b30e366b8e002fc57c07da885a05c1af888d7372ca8bc243657cc44f37ea9723eade845f957512e67a82d15695882ba9095eafc6c68149f31161f097a644090edd7ee4d256cf9539b0fa650af91a6c340ebdca57a43b58f5bf0d4e384af3603d78d051f71b023ea9402d4ddd3847a7a7b8d56e338d6346a019203a85ef101b083b1bcccdc42adc93e29f1d85ea2aa4836c9e23d092e4cd907ae5776738d6a46eda56820fff932f324b211993947ca99df0adabe67156c44b8d3815aedfbbd7ce6c987da9f3c650f8c29a89595a0c5cd700163ab555408ac1a54c174aa20eb630dd3e8cdeeb4a6f6fff58e6cb1e263c677422d383d1754e540fe7938dca151138130c0905353595768c8a5d00623782ff2d2981922d44761698cf392ac0613dbd84cf6c85d2d606cae0f4b0fd46173396e34820dc86882308388066fa711071a1a38736eff6ae13a0bf61c28729d6bda6aaa8041453ea799b31f80eac47b8f4148df20df3f97acaa00a3600b21fed01d32e13694f6ebd3fd1a93c81d30420fb0279cbbb0c1d82011093bc7ab0d179d7c4256e0d7897466492bdd37ad335441929b0d7004ee6197eea4e5455ae852158999b4e8cda13bac563c14a0ce95bb68c5d1b606cf13acab3d6790a2da7fd31bd3f935031c1a66e807f1a62bb78a5593042aacd07204e5a03e1bcbe23d9fcc51f529c52e7baed6bf7045d93726e3079fa36e65cdb1360ddcdebc593f4f36ea43705c5adad4fc515317cfdbef3053d944604856d0b6ca9fc7b37e8e5c0bd641e301dac81f48232a7295a9f6efb87d819855278331b84260a0324562c9954851987294549eaea77f97b189aea56641cf36c70b4e113922473bff5a31c8058b209688ca1f164c88fcbbe202cce8548aca710fca1a272fec471a3aa647a83176b3fc9f4612992718d67752272845420f4da88b5331a4064483c70258d12de63fd917817d78b3eb48a3f0f3de78c8ca0a1f56ed179ed35a7ec426415910f274530f36e35227993fa64717adcf6a3900cc80849e84b601e05ec8302630e27f895a359ecace0de9daa150bfa8ec734255ca0a133e9a92e52d75e0cae3225772716eaea07eae482435c6a25294b13eb32d4bf3672a3ae33479106261e041777184d018a6b462ab02260bd24ce2083f03072bc1a5f0d5c3950dfdca20718b3862a09be148109754bb6fcf9745e031bf9aa6379a651aa355e5f20201d7ff7a2f7eac89baff299aa367330e6aa9a48c4ec3740c9efc6ed5c1e8747ae86969f14ddcbcb5fd04e0434d27f0976e789dc3acb74f427dcd16d8b9819892f91183494450b7df7b281336d473ea44eb1d7a21d9bcf262cf1b60609e58f382f44ef1963f84e9c9db3c88ce4d32ca4651c241d4212e23b662bf5d800dd75b18c65820e9971647186afdc7f4658d8b54c5115b036890b3de9bc739d73f11d73b383e638e32ce2ba7e094acf383608769223706f8c226072dd7737234b51837e272e0b9255419330066c7615f3dff4fe0f86952876c2ffbda641dd160331e060bab1067adea7da2d47db7ceb5033f43e4bc3a664bc35e46a83a85b6766505f27dac760239710ed1917b0ac1747d29e1445619a6db695fd286cd1a477f6a5932d3d51d2833e85a9ab6efa0d737f4090c9eec7e135fe0055a3e4e522b6375056a5037a1be008d4100a1dbf0626b7768281829ab9b31eeaa928615433361480e96317feb77abe9df4713f858e57f77ebe0ef3dd651be7f930eb43bea07a2f67d1e12608c68887d53a5d6b202066f1935f031901880492ed92695c0f650f8996cd10e1bc76a2d314ed08cf61d45b28a2a5a7b2c2b1ddb56fdd84afecdab4bc7dede4c90639017eb36791763bac699cef4bf7ef91fb0235e55e5b484044c17601e5e18101f9a3507f68931782eecde4a0dbf57ca54fddaf03f48ade7bb52619b31b524afa05cbdbe34cdf448b933ff9a9bcc94cf402740ed9e59c5f8a544a5a8f73a44a6375a1e4cee30ea2d817df2829164051fb7256836f0865c5be0759acc0206d6bf5d094bc181a13b865fea7f1ee4d5029517d27d9b33799a07f593b7506a6a2af02926cab09b334c853fddd6c97b1c00da2477c66f5eebe610662da668eb65c959a7c89e9a3b490bb81b2d54cae6148d8afd4f1440cd9523a4c9dbc0f0b2c7e9431361c49ae5b9a2bdd42c256c83b0bd2c96e944e924b0a0a8567de30a7dad4eca1dc25c6040c6b386869cf97e91242f0ed137b2460fecdbd7c13bd370290d85d71a08473aa66d4fb14bf9b2a5eb7224296c2202c5bad425f8b2062bef2249f7952ee22fa81be7284194afd6c1239bd75bb5991fe3c662a468bbede917d27d3e7588657c59209ec08c590482a5f8d732adf8bec74d48c99508fee2b011889d101687650fe5d9c403132a9679d910e7c31025a9cdaa0729dcc13cd54f85106281789751438b6cc4f4a5c96910e132afc1439705902a82220167ccbf4830fb4ff21d035760200914db86e79d22b0748a51476c06a9a4f579975ee37ea25a35364b2e48fedc56416f71130634522819cbf195de45506e2d6ccfe6f035743302b530a9a442d3233037a8f88dd6f5cfea6deb251bdb41f06ff4019d8e2992769da384bc765ab505ebe69fdedd305509605b9d9e57633621613b2e450144921e76fa8eec949954519647ca423e649156499e7623b30a382d8165e5f5ece076b49f6f2c3aebcc85555dddc55f2e54bbddd650765d25acc4d23fd423c4d87165a00310e851482ec6bdd77942c3f4dc2dbed0df68641361554f2d86acbf668b31ab8e3596646ce3670277fc7295f53b6fea52a532c2a0d83fe1e532bd99ea6e12071b7655f89db5517f5b6d4f82e4bf41da94006ea9436b8e50a6666fbbfc816a24b74a4aaf51b7c82a453100f648639d873037cb6300c59910cfdc7666a7be85bd9343bc1abba9f6eca279f10ec4c6fef04f029055206ab1310f16470f25343ee135b4c692edb9767d397bad1ccae3f4788b2a2d820c8b9b829b0f8a68b99d2108d04a9eb1001cfe1cda03f8037226"}) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r6, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r7}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r6}, 0x20) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) r9 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r9, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) (async) setsockopt$sock_int(r9, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) bind$inet6(r9, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r8, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r9}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r8}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x8, &(0x7f00000000c0)=@raw=[@ldst={0x0, 0x3, 0x6, 0x2, 0xa, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @alu={0x4, 0x1, 0x7, 0x5, 0x3, 0x40, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r1}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x2}], &(0x7f0000000140)='syzkaller\x00', 0x453f, 0xd3, &(0x7f0000000200)=""/211, 0x8d03d9f9fa9063df, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000180)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xd, 0x7, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000400)=[r3, r1, r1, r4, r1, r5, r6, r1, 0x1, r8], &(0x7f0000000440)=[{0x2, 0x3, 0x2, 0x8}, {0x5, 0x4, 0xc, 0x8}]}, 0x90) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x4c}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x900000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x4d}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x700}, 0x10}], 0x1}, 0x0) [ 211.523326][T18590] loop1: detected capacity change from 0 to 256 [ 211.536468][T18595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1731 sclass=netlink_route_socket pid=18595 comm=syz-executor.2 [ 211.549741][T18598] loop4: detected capacity change from 0 to 256 15:49:59 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) (async) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfd14) (async) write$cgroup_int(r2, &(0x7f0000000140), 0x12) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r4 = signalfd4(r0, &(0x7f0000000380)={[0x2]}, 0x8, 0x80800) (async) r5 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x200000, 0x102) (async) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) r7 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000780)={0x1, 0x0, 0x1000, 0x3b, &(0x7f0000000540)="fd597dea24280a420c94f41bc668a6d721943649ad0674c0c9043b2125be5af8d9f805544c24b98c3175ad74270028611c7c6d8dce1ebefffe6f15", 0x1000, 0x0, &(0x7f0000000ac0)="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"}) (async) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r6, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r7}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r6}, 0x20) (async) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) (async) r9 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r9, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) (async) bind$inet6(r9, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r8, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r9}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r8}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x8, &(0x7f00000000c0)=@raw=[@ldst={0x0, 0x3, 0x6, 0x2, 0xa, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @alu={0x4, 0x1, 0x7, 0x5, 0x3, 0x40, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r1}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x2}], &(0x7f0000000140)='syzkaller\x00', 0x453f, 0xd3, &(0x7f0000000200)=""/211, 0x8d03d9f9fa9063df, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000180)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xd, 0x7, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000400)=[r3, r1, r1, r4, r1, r5, r6, r1, 0x1, r8], &(0x7f0000000440)=[{0x2, 0x3, 0x2, 0x8}, {0x5, 0x4, 0xc, 0x8}]}, 0x90) (async) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:59 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xd201}}) 15:49:59 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x68}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x6c}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xa00000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x806}, 0x10}], 0x1}, 0x0) 15:49:59 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 211.625259][T18606] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1792 sclass=netlink_route_socket pid=18606 comm=syz-executor.2 [ 211.644803][T18611] loop1: detected capacity change from 0 to 256 [ 211.656831][T18614] loop4: detected capacity change from 0 to 256 15:49:59 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xd900}}) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x74}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xb00000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x7a}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 211.723148][T18626] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2054 sclass=netlink_route_socket pid=18626 comm=syz-executor.2 [ 211.735748][T18627] loop1: detected capacity change from 0 to 256 15:49:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x900}, 0x10}], 0x1}, 0x0) 15:49:59 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xd90a}}) [ 211.767474][ T3425] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 211.804581][T18638] loop1: detected capacity change from 0 to 256 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x96}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0xa00}, 0x10}], 0x1}, 0x0) [ 211.814710][T18643] loop4: detected capacity change from 0 to 256 15:49:59 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:59 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xc00000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0xb00}, 0x10}], 0x1}, 0x0) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x98}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0x9e}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xe402}}) 15:49:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0xc00}, 0x10}], 0x1}, 0x0) 15:49:59 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:59 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0xaa}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 211.914221][T18657] loop4: detected capacity change from 0 to 256 [ 211.952921][T18666] loop1: detected capacity change from 0 to 256 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0xc1}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xd00000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0xd00}, 0x10}], 0x1}, 0x0) 15:49:59 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xec00}}) 15:49:59 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0xca}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 212.010694][T18678] loop4: detected capacity change from 0 to 256 15:49:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0xe00}, 0x10}], 0x1}, 0x0) 15:49:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0xd9}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:49:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xe00000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:49:59 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000200)={'tunl0\x00', 0x0, 0x700, 0x7, 0x9, 0x7, {{0x21, 0x4, 0x2, 0xd, 0x84, 0x67, 0x0, 0x6, 0x4, 0x0, @local, @local, {[@noop, @noop, @timestamp_prespec={0x44, 0x14, 0xbc, 0x3, 0x8, [{@local, 0x2}, {@empty, 0x9}]}, @end, @lsrr={0x83, 0x17, 0x42, [@empty, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @generic={0x44, 0x12, "21381658ae561fb67f2544f8f558d6df"}, @cipso={0x86, 0x2f, 0x1, [{0x2, 0x2}, {0x7, 0x12, "9b76f76ddd2fc5a46c3c38fac8787f12"}, {0x6, 0x4, "15ca"}, {0x1, 0x7, "a0338e1c60"}, {0x6, 0x2}, {0x2, 0x4, "f228"}, {0x0, 0x4, 'A>'}]}, @noop]}}}}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x94, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x38, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x40}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x94}, 0x1, 0x0, 0x0, 0x40000}, 0x4080) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:49:59 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0xff0a}}) 15:49:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0xf00}, 0x10}], 0x1}, 0x0) [ 212.084698][T18693] loop1: detected capacity change from 0 to 256 15:50:00 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0xec}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1100}, 0x10}], 0x1}, 0x0) 15:50:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xf00000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 212.167629][T18705] loop1: detected capacity change from 0 to 256 [ 212.182747][T18708] loop4: detected capacity change from 0 to 256 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1200}, 0x10}], 0x1}, 0x0) 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {0xfc}}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:00 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:00 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}}}) 15:50:00 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000200)={'tunl0\x00', 0x0, 0x700, 0x7, 0x9, 0x7, {{0x21, 0x4, 0x2, 0xd, 0x84, 0x67, 0x0, 0x6, 0x4, 0x0, @local, @local, {[@noop, @noop, @timestamp_prespec={0x44, 0x14, 0xbc, 0x3, 0x8, [{@local, 0x2}, {@empty, 0x9}]}, @end, @lsrr={0x83, 0x17, 0x42, [@empty, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @generic={0x44, 0x12, "21381658ae561fb67f2544f8f558d6df"}, @cipso={0x86, 0x2f, 0x1, [{0x2, 0x2}, {0x7, 0x12, "9b76f76ddd2fc5a46c3c38fac8787f12"}, {0x6, 0x4, "15ca"}, {0x1, 0x7, "a0338e1c60"}, {0x6, 0x2}, {0x2, 0x4, "f228"}, {0x0, 0x4, 'A>'}]}, @noop]}}}}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x94, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x38, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x40}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x94}, 0x1, 0x0, 0x0, 0x40000}, 0x4080) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) close(r1) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000200)={'tunl0\x00', 0x0, 0x700, 0x7, 0x9, 0x7, {{0x21, 0x4, 0x2, 0xd, 0x84, 0x67, 0x0, 0x6, 0x4, 0x0, @local, @local, {[@noop, @noop, @timestamp_prespec={0x44, 0x14, 0xbc, 0x3, 0x8, [{@local, 0x2}, {@empty, 0x9}]}, @end, @lsrr={0x83, 0x17, 0x42, [@empty, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @generic={0x44, 0x12, "21381658ae561fb67f2544f8f558d6df"}, @cipso={0x86, 0x2f, 0x1, [{0x2, 0x2}, {0x7, 0x12, "9b76f76ddd2fc5a46c3c38fac8787f12"}, {0x6, 0x4, "15ca"}, {0x1, 0x7, "a0338e1c60"}, {0x6, 0x2}, {0x2, 0x4, "f228"}, {0x0, 0x4, 'A>'}]}, @noop]}}}}}) (async) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x94, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x38, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x40}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x94}, 0x1, 0x0, 0x0, 0x40000}, 0x4080) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1300}, 0x10}], 0x1}, 0x0) 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00'}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1000000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x2}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1400}, 0x10}], 0x1}, 0x0) 15:50:00 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x2}}) [ 212.289183][T18726] loop1: detected capacity change from 0 to 256 [ 212.320040][T18732] loop4: detected capacity change from 0 to 256 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x3}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:00 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000200)={'tunl0\x00', 0x0, 0x700, 0x7, 0x9, 0x7, {{0x21, 0x4, 0x2, 0xd, 0x84, 0x67, 0x0, 0x6, 0x4, 0x0, @local, @local, {[@noop, @noop, @timestamp_prespec={0x44, 0x14, 0xbc, 0x3, 0x8, [{@local, 0x2}, {@empty, 0x9}]}, @end, @lsrr={0x83, 0x17, 0x42, [@empty, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @generic={0x44, 0x12, "21381658ae561fb67f2544f8f558d6df"}, @cipso={0x86, 0x2f, 0x1, [{0x2, 0x2}, {0x7, 0x12, "9b76f76ddd2fc5a46c3c38fac8787f12"}, {0x6, 0x4, "15ca"}, {0x1, 0x7, "a0338e1c60"}, {0x6, 0x2}, {0x2, 0x4, "f228"}, {0x0, 0x4, 'A>'}]}, @noop]}}}}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x94, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x38, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x40}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x94}, 0x1, 0x0, 0x0, 0x40000}, 0x4080) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:50:00 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1500}, 0x10}], 0x1}, 0x0) 15:50:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1100000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x4}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 212.377880][T18742] loop1: detected capacity change from 0 to 256 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1600}, 0x10}], 0x1}, 0x0) 15:50:00 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x3}}) 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x5}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:00 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6f2e578656da3113cbebfd9c4b61b116e0b4ab636c0b2f834dc0cf74d3dd0fe731c8f1104d5ff2632c2bdd2d7905640a758539797fc432c437bfbd6666d8470a6adb54071c6bb03eb545dbce83320b6ecfc8bee5cc804d2143bc34047005062cef61e3b4f82b046f65b4d491e477637f6cff79eb626cf9786686a02ac9c75e"], 0x81) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f00000000c0)={0x1, 0x1ff}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1800}, 0x10}], 0x1}, 0x0) [ 212.455998][T18755] loop4: detected capacity change from 0 to 256 [ 212.467581][T18756] loop1: detected capacity change from 0 to 256 15:50:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1200000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:00 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x6}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:00 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x4}}) 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1900}, 0x10}], 0x1}, 0x0) 15:50:00 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6f2e578656da3113cbebfd9c4b61b116e0b4ab636c0b2f834dc0cf74d3dd0fe731c8f1104d5ff2632c2bdd2d7905640a758539797fc432c437bfbd6666d8470a6adb54071c6bb03eb545dbce83320b6ecfc8bee5cc804d2143bc34047005062cef61e3b4f82b046f65b4d491e477637f6cff79eb626cf9786686a02ac9c75e"], 0x81) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f00000000c0)={0x1, 0x1ff}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 212.540498][T18772] loop4: detected capacity change from 0 to 256 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1a00}, 0x10}], 0x1}, 0x0) 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x7}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1300000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:00 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x8}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1c00}, 0x10}], 0x1}, 0x0) [ 212.599457][T18782] loop1: detected capacity change from 0 to 256 [ 212.628022][T18786] loop4: detected capacity change from 0 to 256 15:50:00 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6f2e578656da3113cbebfd9c4b61b116e0b4ab636c0b2f834dc0cf74d3dd0fe731c8f1104d5ff2632c2bdd2d7905640a758539797fc432c437bfbd6666d8470a6adb54071c6bb03eb545dbce83320b6ecfc8bee5cc804d2143bc34047005062cef61e3b4f82b046f65b4d491e477637f6cff79eb626cf9786686a02ac9c75e"], 0x81) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f00000000c0)={0x1, 0x1ff}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6f2e578656da3113cbebfd9c4b61b116e0b4ab636c0b2f834dc0cf74d3dd0fe731c8f1104d5ff2632c2bdd2d7905640a758539797fc432c437bfbd6666d8470a6adb54071c6bb03eb545dbce83320b6ecfc8bee5cc804d2143bc34047005062cef61e3b4f82b046f65b4d491e477637f6cff79eb626cf9786686a02ac9c75e"], 0x81) (async) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f00000000c0)={0x1, 0x1ff}) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) 15:50:00 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x5}}) 15:50:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x2000000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1d00}, 0x10}], 0x1}, 0x0) [ 212.676975][T18793] loop1: detected capacity change from 0 to 256 [ 212.717082][T18802] loop4: detected capacity change from 0 to 256 15:50:00 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x9}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1e00}, 0x10}], 0x1}, 0x0) 15:50:00 executing program 4: fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000480)={[{@nodots}, {@fat=@gid={'gid', 0x3d, r0}}, {}]}, 0x2, 0x1a0, &(0x7f0000000240)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={0xffffffffffffffff}, 0x1, 0x0, 0x0, 0x40060}, 0x4000000) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 212.729425][T18805] loop1: detected capacity change from 0 to 256 15:50:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x2010000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0xa}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:00 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x6}}) 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x1f7b}, 0x10}], 0x1}, 0x0) 15:50:00 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x2200000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0xb}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 212.819009][T18821] loop4: detected capacity change from 0 to 256 [ 212.828265][T18824] loop1: detected capacity change from 0 to 256 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2000}, 0x10}], 0x1}, 0x0) 15:50:00 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x7}}) 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0xc}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:00 executing program 4: fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000480)={[{@nodots}, {@fat=@gid={'gid', 0x3d, r0}}, {}]}, 0x2, 0x1a0, &(0x7f0000000240)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={0xffffffffffffffff}, 0x1, 0x0, 0x0, 0x40060}, 0x4000000) (async) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={0xffffffffffffffff}, 0x1, 0x0, 0x0, 0x40060}, 0x4000000) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2100}, 0x10}], 0x1}, 0x0) 15:50:00 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 212.904304][T18835] loop1: detected capacity change from 0 to 256 15:50:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0xd}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x2500000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 212.959391][T18847] loop4: detected capacity change from 0 to 256 [ 212.982216][ T4131] ================================================================== [ 212.990337][ T4131] BUG: KCSAN: data-race in _copy_to_iter / fat_alloc_new_dir [ 212.996833][T18852] loop1: detected capacity change from 0 to 256 [ 212.997715][ T4131] [ 212.997722][ T4131] write to 0xffff88814549f02b of 1 bytes by task 18847 on cpu 1: [ 213.013996][ T4131] fat_alloc_new_dir+0x218/0x510 [ 213.018976][ T4131] msdos_mkdir+0x1e9/0x350 [ 213.023403][ T4131] vfs_mkdir+0x1ac/0x2b0 [ 213.027656][ T4131] do_mkdirat+0xf9/0x260 [ 213.031909][ T4131] __x64_sys_mkdirat+0x50/0x60 [ 213.036678][ T4131] do_syscall_64+0x41/0xc0 [ 213.041096][ T4131] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 213.047002][ T4131] [ 213.049325][ T4131] read to 0xffff88814549f000 of 1024 bytes by task 4131 on cpu 0: [ 213.057129][ T4131] _copy_to_iter+0x12b/0x950 [ 213.061719][ T4131] copy_page_to_iter+0x171/0x2b0 [ 213.066662][ T4131] filemap_read+0x424/0x680 [ 213.071194][ T4131] blkdev_read_iter+0x217/0x2c0 [ 213.076052][ T4131] vfs_read+0x3da/0x5c0 [ 213.080218][ T4131] ksys_read+0xeb/0x1a0 [ 213.084375][ T4131] __x64_sys_read+0x42/0x50 [ 213.088886][ T4131] do_syscall_64+0x41/0xc0 [ 213.093307][ T4131] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 213.099215][ T4131] [ 213.101540][ T4131] Reported by Kernel Concurrency Sanitizer on: 15:50:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2200}, 0x10}], 0x1}, 0x0) 15:50:00 executing program 4: fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000480)={[{@nodots}, {@fat=@gid={'gid', 0x3d, r0}}, {}]}, 0x2, 0x1a0, &(0x7f0000000240)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={0xffffffffffffffff}, 0x1, 0x0, 0x0, 0x40060}, 0x4000000) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000400)) (async) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000480)={[{@nodots}, {@fat=@gid={'gid', 0x3d, r0}}, {}]}, 0x2, 0x1a0, &(0x7f0000000240)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={0xffffffffffffffff}, 0x1, 0x0, 0x0, 0x40060}, 0x4000000) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) [ 213.107687][ T4131] CPU: 0 PID: 4131 Comm: udevd Not tainted 6.6.0-rc4-syzkaller-00284-gb9ddbb0cde2a #0 [ 213.117235][ T4131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 213.127292][ T4131] ================================================================== 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2400}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0xe}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x10}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x8}}) 15:50:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x3f00000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2500}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x11}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x220464, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.dequeue\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="981d8f5056dbe27412079ab7b208f603a561e53d03bebf3148f9339689309249601eff282d71381acfe68e3e6921e3ed7cfc9695306aef4d9e2a36feb6500187c8abd503c80c957d458ef617d9135c4f9829a485091137"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x12}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 213.194577][T18863] loop4: detected capacity change from 0 to 256 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2600}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:01 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x9}}) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2800}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x16}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x220464, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.dequeue\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="981d8f5056dbe27412079ab7b208f603a561e53d03bebf3148f9339689309249601eff282d71381acfe68e3e6921e3ed7cfc9695306aef4d9e2a36feb6500187c8abd503c80c957d458ef617d9135c4f9829a485091137"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x220464, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.dequeue\x00', 0x275a, 0x0) (async) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="981d8f5056dbe27412079ab7b208f603a561e53d03bebf3148f9339689309249601eff282d71381acfe68e3e6921e3ed7cfc9695306aef4d9e2a36feb6500187c8abd503c80c957d458ef617d9135c4f9829a485091137"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) [ 213.289265][T18886] loop1: detected capacity change from 0 to 256 [ 213.292529][T18884] loop4: detected capacity change from 0 to 256 15:50:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x4000000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2900}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x25}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0xa}}) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2a00}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x48}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x3a, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x220464, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.dequeue\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="981d8f5056dbe27412079ab7b208f603a561e53d03bebf3148f9339689309249601eff282d71381acfe68e3e6921e3ed7cfc9695306aef4d9e2a36feb6500187c8abd503c80c957d458ef617d9135c4f9829a485091137"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 213.369896][T18898] loop4: detected capacity change from 0 to 256 [ 213.397221][T18902] loop1: detected capacity change from 0 to 256 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2c00}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x5000000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x4c}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0xb}}) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2d00}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2e00}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x8cffffff00000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x4d}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x2f89}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 213.503561][T18926] loop1: detected capacity change from 0 to 256 [ 213.522229][T18924] loop4: detected capacity change from 0 to 256 15:50:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x34501, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x12}}, 0x10) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x68}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0xc}}) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x3000}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x34501, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x12}}, 0x10) 15:50:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xe5ffffff00000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 213.599132][T18936] loop1: detected capacity change from 0 to 256 [ 213.603996][T18943] loop4: detected capacity change from 0 to 256 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x3100}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x6c}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0xd}}) 15:50:01 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x3200}, 0x10}], 0x1}, 0x0) [ 213.660529][T18952] loop1: detected capacity change from 0 to 256 [ 213.679566][T18954] loop4: detected capacity change from 0 to 256 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x74}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x34501, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x12}}, 0x10) 15:50:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xf0ffffff00000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x3400}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x7a}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x3580}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x96}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xf6ffffff00000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 213.791699][T18978] loop1: detected capacity change from 0 to 256 [ 213.804284][T18974] loop4: detected capacity change from 0 to 256 15:50:01 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0xe}}) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x3a00}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x50, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x98}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x3e00}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xf9fdffff00000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x9e}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 213.880287][T18988] loop1: detected capacity change from 0 to 256 15:50:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e6f646f74732c6e6f6483a8360e1b64d44704aa4f566f74732c63686503002c72656c617865642c00"], 0x2, 0x183, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x311681, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x20a400, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6, @link_local}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000780)={'syztnl1\x00', r2, 0x40, 0x8700, 0x80000001, 0xffffff81, {{0x19, 0x4, 0x1, 0x7, 0x64, 0x68, 0x0, 0x80, 0x73, 0x0, @multicast2, @remote, {[@generic={0x88, 0x12, "5e91b2a95d28157ca783f6f4daf195c7"}, @lsrr={0x83, 0x1f, 0xb2, [@remote, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @local, @broadcast]}, @timestamp_prespec={0x44, 0x1c, 0x68, 0x3, 0x0, [{@broadcast, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7}, {@empty, 0x9}]}, @end]}}}}}) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @random}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6, @link_local}, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x7800, 0x8000, 0x1, 0x3, {{0x17, 0x4, 0x3, 0x1, 0x5c, 0x65, 0x0, 0x6, 0x4, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x3d}, {[@ra={0x94, 0x4}, @noop, @timestamp_addr={0x44, 0x3c, 0x89, 0x1, 0x8, [{@loopback, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@local, 0x2}, {@rand_addr=0x64010102, 0xdd1}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x64010102, 0x9}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x7eb5}]}, @lsrr={0x83, 0x7, 0xf1, [@loopback]}]}}}}}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000008c0)={0x0, @private, @dev}, &(0x7f0000000900)=0xc) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000a40)={&(0x7f0000000940)={0xe8, 0x0, 0x8, 0x70bd25, 0x25dfdbfe}, 0xe8}, 0x1, 0x0, 0x0, 0x40000}, 0x20004044) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) r7 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r6, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r7}, 0x20) r8 = syz_io_uring_complete(0x0) setsockopt$MRT_DEL_MFC(r8, 0x0, 0xcd, &(0x7f0000000280)={@initdev={0xac, 0x1e, 0x1, 0x0}, @remote, 0x4, "435a0e8e4437598c06d65cf5d9ff43f01c15d0406914924e008ffc5d46cc2fd3", 0xfff, 0x9, 0x9, 0x7}, 0x3c) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@loopback, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) r10 = getegid() lchown(&(0x7f0000000300)='./file0\x00', 0x0, r10) fchown(r1, r9, r10) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value, &(0x7f0000000180)=0x8) 15:50:01 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x10}}) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0xaa}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4200}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0xc1}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4300}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xfeffffff00000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4305}, 0x10}], 0x1}, 0x0) [ 213.975588][T19005] loop4: detected capacity change from 0 to 256 [ 213.986856][T19009] loop1: detected capacity change from 0 to 256 [ 213.990166][T19005] FAT-fs (loop4): Unrecognized mount option "nodƒ¨6dÔGªOVots" or missing value 15:50:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4788}, 0x10}], 0x1}, 0x0) 15:50:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0xca}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:01 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x11}}) 15:50:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e6f646f74732c6e6f6483a8360e1b64d44704aa4f566f74732c63686503002c72656c617865642c00"], 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") (async, rerun: 64) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (rerun: 64) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async, rerun: 64) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x311681, 0x0) (async, rerun: 64) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x20a400, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6, @link_local}, 0x10) (async, rerun: 32) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000780)={'syztnl1\x00', r2, 0x40, 0x8700, 0x80000001, 0xffffff81, {{0x19, 0x4, 0x1, 0x7, 0x64, 0x68, 0x0, 0x80, 0x73, 0x0, @multicast2, @remote, {[@generic={0x88, 0x12, "5e91b2a95d28157ca783f6f4daf195c7"}, @lsrr={0x83, 0x1f, 0xb2, [@remote, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @local, @broadcast]}, @timestamp_prespec={0x44, 0x1c, 0x68, 0x3, 0x0, [{@broadcast, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7}, {@empty, 0x9}]}, @end]}}}}}) (rerun: 32) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @random}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6, @link_local}, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x7800, 0x8000, 0x1, 0x3, {{0x17, 0x4, 0x3, 0x1, 0x5c, 0x65, 0x0, 0x6, 0x4, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x3d}, {[@ra={0x94, 0x4}, @noop, @timestamp_addr={0x44, 0x3c, 0x89, 0x1, 0x8, [{@loopback, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@local, 0x2}, {@rand_addr=0x64010102, 0xdd1}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x64010102, 0x9}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x7eb5}]}, @lsrr={0x83, 0x7, 0xf1, [@loopback]}]}}}}}) (async) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000008c0)={0x0, @private, @dev}, &(0x7f0000000900)=0xc) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000a40)={&(0x7f0000000940)={0xe8, 0x0, 0x8, 0x70bd25, 0x25dfdbfe}, 0xe8}, 0x1, 0x0, 0x0, 0x40000}, 0x20004044) (async) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) (async, rerun: 64) r7 = socket$inet6(0xa, 0x80002, 0x0) (rerun: 64) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) (async, rerun: 64) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r6, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r7}, 0x20) (rerun: 64) r8 = syz_io_uring_complete(0x0) setsockopt$MRT_DEL_MFC(r8, 0x0, 0xcd, &(0x7f0000000280)={@initdev={0xac, 0x1e, 0x1, 0x0}, @remote, 0x4, "435a0e8e4437598c06d65cf5d9ff43f01c15d0406914924e008ffc5d46cc2fd3", 0xfff, 0x9, 0x9, 0x7}, 0x3c) (async) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@loopback, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) (async, rerun: 64) r10 = getegid() (rerun: 64) lchown(&(0x7f0000000300)='./file0\x00', 0x0, r10) (async) fchown(r1, r9, r10) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value, &(0x7f0000000180)=0x8) 15:50:02 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4800}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0xd9}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xff03000000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 214.108610][T19023] loop1: detected capacity change from 0 to 256 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0xec}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4888}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x12}}) 15:50:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xfff7ffff00000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4900}, 0x10}], 0x1}, 0x0) [ 214.187647][T19042] loop4: detected capacity change from 0 to 256 [ 214.205876][T19045] loop1: detected capacity change from 0 to 256 15:50:02 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6c, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0xfc}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e6f646f74732c6e6f6483a8360e1b64d44704aa4f566f74732c63686503002c72656c617865642c00"], 0x2, 0x183, &(0x7f00000005c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f2e578656"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) (async, rerun: 32) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async, rerun: 32) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x311681, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x20a400, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6, @link_local}, 0x10) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000780)={'syztnl1\x00', r2, 0x40, 0x8700, 0x80000001, 0xffffff81, {{0x19, 0x4, 0x1, 0x7, 0x64, 0x68, 0x0, 0x80, 0x73, 0x0, @multicast2, @remote, {[@generic={0x88, 0x12, "5e91b2a95d28157ca783f6f4daf195c7"}, @lsrr={0x83, 0x1f, 0xb2, [@remote, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @local, @broadcast]}, @timestamp_prespec={0x44, 0x1c, 0x68, 0x3, 0x0, [{@broadcast, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7}, {@empty, 0x9}]}, @end]}}}}}) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @random}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6, @link_local}, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000840)={'ip_vti0\x00', 0x0, 0x7800, 0x8000, 0x1, 0x3, {{0x17, 0x4, 0x3, 0x1, 0x5c, 0x65, 0x0, 0x6, 0x4, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x3d}, {[@ra={0x94, 0x4}, @noop, @timestamp_addr={0x44, 0x3c, 0x89, 0x1, 0x8, [{@loopback, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@local, 0x2}, {@rand_addr=0x64010102, 0xdd1}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x64010102, 0x9}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x7eb5}]}, @lsrr={0x83, 0x7, 0xf1, [@loopback]}]}}}}}) (async) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000008c0)={0x0, @private, @dev}, &(0x7f0000000900)=0xc) (async) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000a40)={&(0x7f0000000940)={0xe8, 0x0, 0x8, 0x70bd25, 0x25dfdbfe}, 0xe8}, 0x1, 0x0, 0x0, 0x40000}, 0x20004044) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) r7 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) (async, rerun: 64) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) (async, rerun: 64) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r6, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r7}, 0x20) r8 = syz_io_uring_complete(0x0) setsockopt$MRT_DEL_MFC(r8, 0x0, 0xcd, &(0x7f0000000280)={@initdev={0xac, 0x1e, 0x1, 0x0}, @remote, 0x4, "435a0e8e4437598c06d65cf5d9ff43f01c15d0406914924e008ffc5d46cc2fd3", 0xfff, 0x9, 0x9, 0x7}, 0x3c) (async) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@loopback, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) (async) r10 = getegid() lchown(&(0x7f0000000300)='./file0\x00', 0x0, r10) fchown(r1, r9, r10) (async) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value, &(0x7f0000000180)=0x8) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4a00}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xffff030000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:02 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x24}}) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x125}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 214.265750][T19059] loop1: detected capacity change from 0 to 256 15:50:02 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xe5ffffff, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4c00}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x74, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xffff1f0000000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 214.330201][T19067] loop4: detected capacity change from 0 to 256 [ 214.342674][T19072] loop1: detected capacity change from 0 to 256 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x138}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4e00}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x2a}}) 15:50:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xffffff0f00000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:02 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x171}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 214.412358][T19085] loop1: detected capacity change from 0 to 256 [ 214.423339][T19087] loop4: detected capacity change from 0 to 256 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x4f00}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$eJzs3TFLG2EYB/AnaZqETtkKpcNBl06h7SdIKSmUHghKBp0UoksigllOp3wMP6AfQDJli+hpTkNchOQ0+f2We+DPC8+zvDfdc4dfTwf9s9HJ9eeraDYrUe1EJ6aVaEU1Ho0DANgk09ksbma5snsBANbD+x8Ats/e/sH/32na3U2SZsRknPWyXv7M87//0u6P5F6rODXJst6Hef4zz5Pn+cf49JD/WprX4/u3PL/L/uykC3kj+qsfHwAAAAAAAAAAAAAAAAAAAAAAStFO5pbu92m3X8rz6sl+oIX9PbX4UlvbGAAAAAAAAAAAAAAAAAAAAPCujS4uB0fD4fG5QrExRfI22hjG647XI6L05os7olHmBQUAAAAAAAAAAAAAAAAAAFuk+Oi37E4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDzF//9XV5Q9IwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJvvNgAA///0XTU5") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x40000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x18e}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x2f}}) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5000}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x1d0}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xffffff7f00000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 214.490836][T19096] loop1: detected capacity change from 0 to 256 [ 214.510800][T19101] loop4: detected capacity change from 0 to 256 15:50:02 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:02 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000140)={[{@nodots}, {@fat=@discard}, {@dots}]}, 0x3, 0x18c, &(0x7f00000003c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2321202e2f66696c6530206367726f75702e636f6e74726f6c6c6572730020242020235b2064697363617264206e6f646f74730adafb40e86806da5e020650e3cb00b625f0b1c75450036cf1ee535681575fe513591a65cc32928128a1b331585d8005b504bf915842a35521131ec6d6d0b916a4ac8311d52b52480c80307f70f92cbafb99909712ebaf89c4d18092bc580bafce2524c0cf782ab0da3a414cec906c397a22489261decf37477b058785fadacbb427"], 0xb5) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000cc0)='-!\x00') bind$rds(r2, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r2, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @random}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6, @link_local}, 0x10) sendmmsg$inet(r2, &(0x7f0000000c00)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)="36ebcc85e56abb9d87c93ace500913fa3165f1079594cdb602be6de168d519b5ef75ef25e51537b1d00451fd6ba24df449cd1d4b2b18dc98632de256954330962ec5f82c127ad91a855dc6dd0cb131f942ce010364a0ea081f47ca497f9c29e1427f22f1964a65eb562a6e8a482b9316ce34e98435327009b116f465fa2083f335c7efb8e59f834408ee03a4577b7c8641", 0x91}, {&(0x7f0000000240)="7652c0b6ef86a2bcb5c1ff9c3f3a472083e0ba3323dcd857462190be1aa88c", 0x1f}, {&(0x7f0000000580)="c7bf0f0000c18006bce55275701a851095722e132db484c3a48598ea8a6cdc4a0f5c5bf7fb72c42e02e07d95249c3cc3758c35f6279a1b10d28c9e821a80be84fc3a9a56fdb2525476c3bd2a00512f7a4820e429aed919be86f3eb11c467fd43d61456eb94dd111310f421fece553ee7f080542ce868de79c3facc91f939a4af9b4742d514ab3e2b", 0x88}, {&(0x7f0000000380)="f31a3a81e783a85eadcd40c2815b180b646eadf651a06ef776583675c3ccd3570d", 0x21}, {&(0x7f0000000640)="9a6c8f442c1885f0910e73b3ab34d813ff76b347a7fd5e225b82111e53de88e8de1ac8988d44efa4c288f3022895a5b6324506929145928c9edb2b14b05f1b1bebf5068970eb6bc9770d22f1b056f17fb46db014e4204de2afe285bba7e322c2b2f2f1580fe7db8a", 0x68}, {&(0x7f00000006c0)="2150e0398dd3fd0c4e682284f58b7b5e23843a2c679b9146692caa51506e9b1f0ad8bbc8d1aeb8f8985a8966adf0e54a6162545efff0d4720c974b81c740effc50edeadb3b388eb79dff2673a8edfa86c7e6e4f36c41331a9a5b0d94be9ae11a38146d50336a70fed211f11408c134c502c56d8cdc00ebda1fb4c04314624581ceb1f6ed2c7f89bb94533483b4af139203d7ea5318b2ef28383144a94089bdfd384814", 0xa3}, {&(0x7f0000000780)="506f4eb20e805b0947fde8a3d019ed4bb146b798a46901704fcbdf3b9e0aa1c4777df57be4d933d559b6b9fa55a8208f4cca64596f52", 0x36}], 0x7, &(0x7f0000000840)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x16}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x98}}, {{&(0x7f0000000900)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10, &(0x7f00000009c0)=[{&(0x7f0000000940)="0d7aff7211bc7a33a4b17e275181cd0ce96012500bda5952f83fa98ce2dcd571b1d0873eaffff2ed5ea6e7c6afe4730c58cb8884254171c1086febd1abbccbcbb4ab364c7393715252c13d7b9d8e1196cd", 0x51}], 0x1, &(0x7f0000000a00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x92}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x74, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0xce, [@multicast2, @multicast2, @loopback, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x2e}]}, @ssrr={0x89, 0x1b, 0xb8, [@empty, @remote, @rand_addr=0x64010102, @broadcast, @local, @dev={0xac, 0x14, 0x14, 0xf}]}, @generic={0x89, 0x9, "1aedf91e03148e"}, @ra={0x94, 0x4}, @noop, @generic={0x1bb, 0x6, "41bd8fe5"}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x13, 0xf6, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @broadcast]}]}}}, @ip_retopts={{0xa4, 0x0, 0x7, {[@cipso={0x86, 0x50, 0x0, [{0x6, 0x3, "14"}, {0x0, 0x4, "19a4"}, {0x1, 0x10, "f91e18aa9840e49919db9e266dd9"}, {0x2, 0x3, "d7"}, {0x7, 0x10, "f3163cf7c0f5bf947f6ac36aa7d6"}, {0x5, 0x10, "5ae8e24e5d28469152fa9543e8de"}, {0x0, 0x10, "aa9617ab7eba5ccfc207bbbce71e"}]}, @timestamp={0x44, 0x8, 0xde, 0x0, 0x4, [0x1]}, @noop, @timestamp={0x44, 0x18, 0x75, 0x0, 0xb, [0x6, 0x5, 0x7, 0xffffffe4, 0x0]}, @timestamp={0x44, 0xc, 0x38, 0x0, 0x2, [0x20, 0x0]}, @noop, @generic={0xb, 0xc, "e622b4e7a39f7be0022a"}, @lsrr={0x83, 0x7, 0xac, [@empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3f72}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast1, @multicast2}}}], 0x1d0}}], 0x2, 0x4000) write$binfmt_misc(r0, &(0x7f0000000c80)=ANY=[@ANYBLOB="bbe7fd2bb93749cab31f316e2e56"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5100}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x1d2}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x213}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5200}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0xffffffff00000000, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:02 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x3a}}) [ 214.615556][T19118] loop1: detected capacity change from 0 to 256 [ 214.641783][T19124] loop4: detected capacity change from 0 to 256 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x23a}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5400}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) [ 214.677095][T19124] batadv_slave_0: entered promiscuous mode [ 214.691254][T19124] batadv0: entered promiscuous mode [ 214.704866][T19130] loop1: detected capacity change from 0 to 256 [ 214.720061][T19121] batadv0: left promiscuous mode 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x248}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel, 0x22}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 15:50:02 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000140)={[{@nodots}, {@fat=@discard}, {@dots}]}, 0x3, 0x18c, &(0x7f00000003c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2321202e2f66696c6530206367726f75702e636f6e74726f6c6c6572730020242020235b2064697363617264206e6f646f74730adafb40e86806da5e020650e3cb00b625f0b1c75450036cf1ee535681575fe513591a65cc32928128a1b331585d8005b504bf915842a35521131ec6d6d0b916a4ac8311d52b52480c80307f70f92cbafb99909712ebaf89c4d18092bc580bafce2524c0cf782ab0da3a414cec906c397a22489261decf37477b058785fadacbb427"], 0xb5) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000cc0)='-!\x00') bind$rds(r2, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r2, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @random}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6, @link_local}, 0x10) sendmmsg$inet(r2, &(0x7f0000000c00)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)="36ebcc85e56abb9d87c93ace500913fa3165f1079594cdb602be6de168d519b5ef75ef25e51537b1d00451fd6ba24df449cd1d4b2b18dc98632de256954330962ec5f82c127ad91a855dc6dd0cb131f942ce010364a0ea081f47ca497f9c29e1427f22f1964a65eb562a6e8a482b9316ce34e98435327009b116f465fa2083f335c7efb8e59f834408ee03a4577b7c8641", 0x91}, {&(0x7f0000000240)="7652c0b6ef86a2bcb5c1ff9c3f3a472083e0ba3323dcd857462190be1aa88c", 0x1f}, {&(0x7f0000000580)="c7bf0f0000c18006bce55275701a851095722e132db484c3a48598ea8a6cdc4a0f5c5bf7fb72c42e02e07d95249c3cc3758c35f6279a1b10d28c9e821a80be84fc3a9a56fdb2525476c3bd2a00512f7a4820e429aed919be86f3eb11c467fd43d61456eb94dd111310f421fece553ee7f080542ce868de79c3facc91f939a4af9b4742d514ab3e2b", 0x88}, {&(0x7f0000000380)="f31a3a81e783a85eadcd40c2815b180b646eadf651a06ef776583675c3ccd3570d", 0x21}, {&(0x7f0000000640)="9a6c8f442c1885f0910e73b3ab34d813ff76b347a7fd5e225b82111e53de88e8de1ac8988d44efa4c288f3022895a5b6324506929145928c9edb2b14b05f1b1bebf5068970eb6bc9770d22f1b056f17fb46db014e4204de2afe285bba7e322c2b2f2f1580fe7db8a", 0x68}, {&(0x7f00000006c0)="2150e0398dd3fd0c4e682284f58b7b5e23843a2c679b9146692caa51506e9b1f0ad8bbc8d1aeb8f8985a8966adf0e54a6162545efff0d4720c974b81c740effc50edeadb3b388eb79dff2673a8edfa86c7e6e4f36c41331a9a5b0d94be9ae11a38146d50336a70fed211f11408c134c502c56d8cdc00ebda1fb4c04314624581ceb1f6ed2c7f89bb94533483b4af139203d7ea5318b2ef28383144a94089bdfd384814", 0xa3}, {&(0x7f0000000780)="506f4eb20e805b0947fde8a3d019ed4bb146b798a46901704fcbdf3b9e0aa1c4777df57be4d933d559b6b9fa55a8208f4cca64596f52", 0x36}], 0x7, &(0x7f0000000840)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x16}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x98}}, {{&(0x7f0000000900)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10, &(0x7f00000009c0)=[{&(0x7f0000000940)="0d7aff7211bc7a33a4b17e275181cd0ce96012500bda5952f83fa98ce2dcd571b1d0873eaffff2ed5ea6e7c6afe4730c58cb8884254171c1086febd1abbccbcbb4ab364c7393715252c13d7b9d8e1196cd", 0x51}], 0x1, &(0x7f0000000a00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x92}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x74, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0xce, [@multicast2, @multicast2, @loopback, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x2e}]}, @ssrr={0x89, 0x1b, 0xb8, [@empty, @remote, @rand_addr=0x64010102, @broadcast, @local, @dev={0xac, 0x14, 0x14, 0xf}]}, @generic={0x89, 0x9, "1aedf91e03148e"}, @ra={0x94, 0x4}, @noop, @generic={0x1bb, 0x6, "41bd8fe5"}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x13, 0xf6, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @broadcast]}]}}}, @ip_retopts={{0xa4, 0x0, 0x7, {[@cipso={0x86, 0x50, 0x0, [{0x6, 0x3, "14"}, {0x0, 0x4, "19a4"}, {0x1, 0x10, "f91e18aa9840e49919db9e266dd9"}, {0x2, 0x3, "d7"}, {0x7, 0x10, "f3163cf7c0f5bf947f6ac36aa7d6"}, {0x5, 0x10, "5ae8e24e5d28469152fa9543e8de"}, {0x0, 0x10, "aa9617ab7eba5ccfc207bbbce71e"}]}, @timestamp={0x44, 0x8, 0xde, 0x0, 0x4, [0x1]}, @noop, @timestamp={0x44, 0x18, 0x75, 0x0, 0xb, [0x6, 0x5, 0x7, 0xffffffe4, 0x0]}, @timestamp={0x44, 0xc, 0x38, 0x0, 0x2, [0x20, 0x0]}, @noop, @generic={0xb, 0xc, "e622b4e7a39f7be0022a"}, @lsrr={0x83, 0x7, 0xac, [@empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3f72}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast1, @multicast2}}}], 0x1d0}}], 0x2, 0x4000) write$binfmt_misc(r0, &(0x7f0000000c80)=ANY=[@ANYBLOB="bbe7fd2bb93749cab31f316e2e56"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 214.725229][T19121] batadv_slave_0: left promiscuous mode 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5500}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x260}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x48}}) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5600}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0xaa, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x286}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 214.793202][T19145] loop1: detected capacity change from 0 to 256 [ 214.814039][T19149] loop4: detected capacity change from 0 to 256 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5800}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x4a}}) 15:50:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x22, 0xee01}}]}) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x2d7}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 214.849469][T19149] batadv_slave_0: entered promiscuous mode [ 214.869095][T19149] batadv0: entered promiscuous mode [ 214.886768][T19162] xt_ct_set_timeout: 82 callbacks suppressed 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x2e4}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5865}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:02 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000140)={[{@nodots}, {@fat=@discard}, {@dots}]}, 0x3, 0x18c, &(0x7f00000003c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2321202e2f66696c6530206367726f75702e636f6e74726f6c6c6572730020242020235b2064697363617264206e6f646f74730adafb40e86806da5e020650e3cb00b625f0b1c75450036cf1ee535681575fe513591a65cc32928128a1b331585d8005b504bf915842a35521131ec6d6d0b916a4ac8311d52b52480c80307f70f92cbafb99909712ebaf89c4d18092bc580bafce2524c0cf782ab0da3a414cec906c397a22489261decf37477b058785fadacbb427"], 0xb5) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000cc0)='-!\x00') bind$rds(r2, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r2, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @random}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6, @link_local}, 0x10) sendmmsg$inet(r2, &(0x7f0000000c00)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)="36ebcc85e56abb9d87c93ace500913fa3165f1079594cdb602be6de168d519b5ef75ef25e51537b1d00451fd6ba24df449cd1d4b2b18dc98632de256954330962ec5f82c127ad91a855dc6dd0cb131f942ce010364a0ea081f47ca497f9c29e1427f22f1964a65eb562a6e8a482b9316ce34e98435327009b116f465fa2083f335c7efb8e59f834408ee03a4577b7c8641", 0x91}, {&(0x7f0000000240)="7652c0b6ef86a2bcb5c1ff9c3f3a472083e0ba3323dcd857462190be1aa88c", 0x1f}, {&(0x7f0000000580)="c7bf0f0000c18006bce55275701a851095722e132db484c3a48598ea8a6cdc4a0f5c5bf7fb72c42e02e07d95249c3cc3758c35f6279a1b10d28c9e821a80be84fc3a9a56fdb2525476c3bd2a00512f7a4820e429aed919be86f3eb11c467fd43d61456eb94dd111310f421fece553ee7f080542ce868de79c3facc91f939a4af9b4742d514ab3e2b", 0x88}, {&(0x7f0000000380)="f31a3a81e783a85eadcd40c2815b180b646eadf651a06ef776583675c3ccd3570d", 0x21}, {&(0x7f0000000640)="9a6c8f442c1885f0910e73b3ab34d813ff76b347a7fd5e225b82111e53de88e8de1ac8988d44efa4c288f3022895a5b6324506929145928c9edb2b14b05f1b1bebf5068970eb6bc9770d22f1b056f17fb46db014e4204de2afe285bba7e322c2b2f2f1580fe7db8a", 0x68}, {&(0x7f00000006c0)="2150e0398dd3fd0c4e682284f58b7b5e23843a2c679b9146692caa51506e9b1f0ad8bbc8d1aeb8f8985a8966adf0e54a6162545efff0d4720c974b81c740effc50edeadb3b388eb79dff2673a8edfa86c7e6e4f36c41331a9a5b0d94be9ae11a38146d50336a70fed211f11408c134c502c56d8cdc00ebda1fb4c04314624581ceb1f6ed2c7f89bb94533483b4af139203d7ea5318b2ef28383144a94089bdfd384814", 0xa3}, {&(0x7f0000000780)="506f4eb20e805b0947fde8a3d019ed4bb146b798a46901704fcbdf3b9e0aa1c4777df57be4d933d559b6b9fa55a8208f4cca64596f52", 0x36}], 0x7, &(0x7f0000000840)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x16}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x98}}, {{&(0x7f0000000900)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10, &(0x7f00000009c0)=[{&(0x7f0000000940)="0d7aff7211bc7a33a4b17e275181cd0ce96012500bda5952f83fa98ce2dcd571b1d0873eaffff2ed5ea6e7c6afe4730c58cb8884254171c1086febd1abbccbcbb4ab364c7393715252c13d7b9d8e1196cd", 0x51}], 0x1, &(0x7f0000000a00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x92}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x74, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0xce, [@multicast2, @multicast2, @loopback, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x2e}]}, @ssrr={0x89, 0x1b, 0xb8, [@empty, @remote, @rand_addr=0x64010102, @broadcast, @local, @dev={0xac, 0x14, 0x14, 0xf}]}, @generic={0x89, 0x9, "1aedf91e03148e"}, @ra={0x94, 0x4}, @noop, @generic={0x1bb, 0x6, "41bd8fe5"}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x13, 0xf6, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @broadcast]}]}}}, @ip_retopts={{0xa4, 0x0, 0x7, {[@cipso={0x86, 0x50, 0x0, [{0x6, 0x3, "14"}, {0x0, 0x4, "19a4"}, {0x1, 0x10, "f91e18aa9840e49919db9e266dd9"}, {0x2, 0x3, "d7"}, {0x7, 0x10, "f3163cf7c0f5bf947f6ac36aa7d6"}, {0x5, 0x10, "5ae8e24e5d28469152fa9543e8de"}, {0x0, 0x10, "aa9617ab7eba5ccfc207bbbce71e"}]}, @timestamp={0x44, 0x8, 0xde, 0x0, 0x4, [0x1]}, @noop, @timestamp={0x44, 0x18, 0x75, 0x0, 0xb, [0x6, 0x5, 0x7, 0xffffffe4, 0x0]}, @timestamp={0x44, 0xc, 0x38, 0x0, 0x2, [0x20, 0x0]}, @noop, @generic={0xb, 0xc, "e622b4e7a39f7be0022a"}, @lsrr={0x83, 0x7, 0xac, [@empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3f72}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast1, @multicast2}}}], 0x1d0}}], 0x2, 0x4000) write$binfmt_misc(r0, &(0x7f0000000c80)=ANY=[@ANYBLOB="bbe7fd2bb93749cab31f316e2e56"], 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:50:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x2c, 0xee01}}]}) [ 214.886785][T19162] xt_CT: You must specify a L4 protocol and not use inversions on it [ 214.903880][T19144] batadv0: left promiscuous mode [ 214.916763][T19166] xt_CT: You must specify a L4 protocol and not use inversions on it [ 214.917083][T19144] batadv_slave_0: left promiscuous mode [ 214.942909][T19168] loop1: detected capacity change from 0 to 256 15:50:02 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x4c}}) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5900}, 0x10}], 0x1}, 0x0) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x2ec}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x300}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x33e}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 15:50:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5a00}, 0x10}], 0x1}, 0x0) [ 214.958871][T19171] xt_CT: You must specify a L4 protocol and not use inversions on it [ 215.009092][T19179] loop1: detected capacity change from 0 to 256 [ 215.022221][T19183] xt_CT: You must specify a L4 protocol and not use inversions on it [ 215.032674][T19184] loop4: detected capacity change from 0 to 256 15:50:02 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0xc1, 0x0, 0x0, @mcast1={0xff, 0x5}, @mcast2={0xff, 0x5}}}) 15:50:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000001c0)={[{@nodots}, {@nodots}, {}]}, 0x2, 0x183, &(0x7f00000005c0)="$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") mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000780)={[], [{@seclabel}, {@euid_eq={'euid', 0x3d, 0xee01}, 0x22}]}) 15:50:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'macvlan1\x00', 'bond_slave_1\x00', {}, {}, 0x35a}, 0x0, 0x118, 0x138, 0x52020000, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x7}}, @inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 215.049459][T19187] xt_CT: You must specify a L4 protocol and not use inversions on it [ 215.078034][T19184] batadv_slave_0: entered promiscuous mode [ 215.096234][T19192] xt_CT: You must specify a L4 protocol and not use inversions on it [ 215.113032][T19184] batadv0: entered promiscuous mode 15:50:02 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000c80)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x4d}}) 15:50:03 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000140)={[{@nodots}, {@fat=@discard}, {@dots}]}, 0x3, 0x18c, &(0x7f00000003c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2321202e2f66696c6530206367726f75702e636f6e74726f6c6c6572730020242020235b2064697363617264206e6f646f74730adafb40e86806da5e020650e3cb00b625f0b1c75450036cf1ee535681575fe513591a65cc32928128a1b331585d8005b504bf915842a35521131ec6d6d0b916a4ac8311d52b52480c80307f70f92cbafb99909712ebaf89c4d18092bc580bafce2524c0cf782ab0da3a414cec906c397a22489261decf37477b058785fadacbb427"], 0xb5) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000cc0)='-!\x00') bind$rds(r2, &(0x7f00000029c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r2, &(0x7f0000002b40)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@rdma_args={0x10, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f0000000080)=""/114, 0x72}, {0x0}], 0x2}}], 0x48}, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @random}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6, @link_local}, 0x10) sendmmsg$inet(r2, &(0x7f0000000c00)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)="36ebcc85e56abb9d87c93ace500913fa3165f1079594cdb602be6de168d519b5ef75ef25e51537b1d00451fd6ba24df449cd1d4b2b18dc98632de256954330962ec5f82c127ad91a855dc6dd0cb131f942ce010364a0ea081f47ca497f9c29e1427f22f1964a65eb562a6e8a482b9316ce34e98435327009b116f465fa2083f335c7efb8e59f834408ee03a4577b7c8641", 0x91}, {&(0x7f0000000240)="7652c0b6ef86a2bcb5c1ff9c3f3a472083e0ba3323dcd857462190be1aa88c", 0x1f}, {&(0x7f0000000580)="c7bf0f0000c18006bce55275701a851095722e132db484c3a48598ea8a6cdc4a0f5c5bf7fb72c42e02e07d95249c3cc3758c35f6279a1b10d28c9e821a80be84fc3a9a56fdb2525476c3bd2a00512f7a4820e429aed919be86f3eb11c467fd43d61456eb94dd111310f421fece553ee7f080542ce868de79c3facc91f939a4af9b4742d514ab3e2b", 0x88}, {&(0x7f0000000380)="f31a3a81e783a85eadcd40c2815b180b646eadf651a06ef776583675c3ccd3570d", 0x21}, {&(0x7f0000000640)="9a6c8f442c1885f0910e73b3ab34d813ff76b347a7fd5e225b82111e53de88e8de1ac8988d44efa4c288f3022895a5b6324506929145928c9edb2b14b05f1b1bebf5068970eb6bc9770d22f1b056f17fb46db014e4204de2afe285bba7e322c2b2f2f1580fe7db8a", 0x68}, {&(0x7f00000006c0)="2150e0398dd3fd0c4e682284f58b7b5e23843a2c679b9146692caa51506e9b1f0ad8bbc8d1aeb8f8985a8966adf0e54a6162545efff0d4720c974b81c740effc50edeadb3b388eb79dff2673a8edfa86c7e6e4f36c41331a9a5b0d94be9ae11a38146d50336a70fed211f11408c134c502c56d8cdc00ebda1fb4c04314624581ceb1f6ed2c7f89bb94533483b4af139203d7ea5318b2ef28383144a94089bdfd384814", 0xa3}, {&(0x7f0000000780)="506f4eb20e805b0947fde8a3d019ed4bb146b798a46901704fcbdf3b9e0aa1c4777df57be4d933d559b6b9fa55a8208f4cca64596f52", 0x36}], 0x7, &(0x7f0000000840)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x16}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x98}}, {{&(0x7f0000000900)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10, &(0x7f00000009c0)=[{&(0x7f0000000940)="0d7aff7211bc7a33a4b17e275181cd0ce96012500bda5952f83fa98ce2dcd571b1d0873eaffff2ed5ea6e7c6afe4730c58cb8884254171c1086febd1abbccbcbb4ab364c7393715252c13d7b9d8e1196cd", 0x51}], 0x1, &(0x7f0000000a00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x92}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x74, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0xce, [@multicast2, @multicast2, @loopback, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x2e}]}, @ssrr={0x89, 0x1b, 0xb8, [@empty, @remote, @rand_addr=0x64010102, @broadcast, @local, @dev={0xac, 0x14, 0x14, 0xf}]}, @generic={0x89, 0x9, "1aedf91e03148e"}, @ra={0x94, 0x4}, @noop, @generic={0x1bb, 0x6, "41bd8fe5"}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x13, 0xf6, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @broadcast]}]}}}, @ip_retopts={{0xa4, 0x0, 0x7, {[@cipso={0x86, 0x50, 0x0, [{0x6, 0x3, "14"}, {0x0, 0x4, "19a4"}, {0x1, 0x10, "f91e18aa9840e49919db9e266dd9"}, {0x2, 0x3, "d7"}, {0x7, 0x10, "f3163cf7c0f5bf947f6ac36aa7d6"}, {0x5, 0x10, "5ae8e24e5d28469152fa9543e8de"}, {0x0, 0x10, "aa9617ab7eba5ccfc207bbbce71e"}]}, @timestamp={0x44, 0x8, 0xde, 0x0, 0x4, [0x1]}, @noop, @timestamp={0x44, 0x18, 0x75, 0x0, 0xb, [0x6, 0x5, 0x7, 0xffffffe4, 0x0]}, @timestamp={0x44, 0xc, 0x38, 0x0, 0x2, [0x20, 0x0]}, @noop, @generic={0xb, 0xc, "e622b4e7a39f7be0022a"}, @lsrr={0x83, 0x7, 0xac, [@empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3f72}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast1, @multicast2}}}], 0x1d0}}], 0x2, 0x4000) write$binfmt_misc(r0, &(0x7f0000000c80)=ANY=[@ANYBLOB="bbe7fd2bb93749cab31f316e2e56"], 0x81) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:50:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10, 0x5c00}, 0x10}], 0x1}, 0x0) 15:50:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x5c, 0x160, 0x138, 0x3e0, 0x248, 0x228, 0x228, 0x248, 0x228, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x